Please turn on your JavaScript for this page to function normally.
Multiple vulnerabilities in RealPlayer

Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user’s system, according to Secunia. Users should …

McDonald’s customer data compromised

If you previously elected to submit information to McDonald’s in connection with one of their websites or promotions, there is a possibility that information you …

Week in review: Assange arrested, 2011 threat landscape and first VoIP call from space

Here’s an overview of some of last week’s most interesting news and articles: McAfee’s Secure Short URL Service not so secure M86 Security Labs’ …

Security, is there an app for that?

Smartphones are now an essential tool across all sections of society, from top government officials to businesses and consumers. If you are one of the hundreds of millions of …

Underground toolkits will make cyber espionage easy

With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …

Advanced iPhone spy application

Mobistealth launched an advanced iPhone spy application which can be installed on any iPhone and runs completely in the background. The application is virtually undetectable …

Firefox 3.6.13 fixes many security issues

Mozilla released Firefox 3.6.13 that fixes several security issues. Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) Mozilla developers identified and fixed several …

Deploy and remotely execute programs on Windows networks

RemoteExec for Windows is an agentless, encrypted software solution that allows IT pros to: Quickly and easily deploy MSI packages, Service Packs, patches, hotfixes, etc. …

New book: Troubleshooting Windows 7 Inside Out

You’re beyond the basics, so dive right into troubleshooting Windows 7 and really put your PC to work! Troubleshooting Windows 7 Inside Out describes hundreds of …

Increased illicit behavior on Internet pharmacies

Of the nearly 7,000 sites reviewed by the National Association of Boards of Pharmacy, only 4% of those online sites appear to be in compliance with pharmacy laws and practice …

Trojans dominate the threat landscape

As in recent months, Trojans dominated the threat landscape in November, according to GFI Software. Their data revealed that seven of the top 10 malware threats were …

Run Nmap on Android

Droidmap is an Android application for root users that implements some functions of Nmap in a GUI. This program comes with installer scripts for the installation of the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools