Video: Exploiting the iPhone
This is the demonstration of an iPhone exploit developed by the software security group at Independent Security Evaluators.
New Excel spam hits the airwaves
Microsoft Excel is the newest packaging spammers have created for their stock pump-and-dump scams, Commtouch reported today, based on the Company’s analysis of billions …
Microsoft Excel virus and a ransomware trojan
It is very easy to know when Pahooka.A has infected a computer. Once run, it replaces the computer’s desktop wallpaper with a multicolored star on a blue background and …
Peer-to-peer software leaks confidential police data
IT security and control firm Sophos is reminding companies of the importance of enforcing stringent IT security policies after it was revealed that a Japanese policeman has …
Data protection made better with Encryptionizer
NetLib announced the availability of the company’s next release of its flagship product, NetLib Encryptionizer. The company’s enhanced data encryption solution …
LaCie unveils 2TB Big Disk Extreme+ with advanced backup software
LaCie unveiled the triple-interface Big Disk Extreme+ with LaCie Shortcut Button and included EMC Retrospect backup and recovery software for Windows/Mac OS. This versatile …
The Simpsons used by cybercriminals to harvest email addresses
Sophos is reminding computer users of the importance of not responding to unsolicited email surveys following the discovery of a spam campaign that is exploiting interest in …
Euro six nations match the US in spam stakes
SophosLabs scanned all spam messages received in the company’s global network of spam traps, and have revealed that the US continues to relay more spam than any other …
Information on Pinch tool for creating custom Trojans
PandaLabs has uncovered Pinch, a tool sold on several online forums and designed to create Trojans. The tool lets cyber-crooks define a series of malicious actions that the …
Spam mails in PDF format flood the web
If you thought emails carrying embedded images are the current trend in spam town, it’s time to move on. According AntiVirus, AntiSpam and Content Security solution …
List of vulnerabilities fixed in the new 2.0.0.5 version of Firefox
Mozilla Firefox 2.0.0.5 web browser was just released. Here is a list of security vulnerabilities it fixes: MFSA 2007-25 XPCNativeWrapper pollution shutdown and moz_bug_r_a4 …
Oracle critical patch update – July 2007
Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required (because of interdependencies) by …
Featured news
Resources
Don't miss
- Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say
- Portmaster: Open-source application firewall
- Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)
- How a noisy ransomware intrusion exposed a long-term espionage foothold
- Creative cybersecurity strategies for resource-constrained institutions