Please turn on your JavaScript for this page to function normally.
How black hat spam SEO works

For some time, attackers have leveraged Search Engine Optimization (SEO) techniques in order to promote malicious web content targeting end users. Google has researched this …

Firefox 3.6.9 fixes numerous security issues

Mozilla released Firefox 3.6.9 that fixes several security issues as well as stability issues. Miscellaneous memory safety hazards Mozilla developers identified and fixed …

Phishers exploit HMRC tax error refund

Tax authorities in the UK are in the process of contacting millions of people, telling them that they have paid the wrong amount of tax. As members of the public wait to be …

Sourcefire integrates with Qualys

Sourcefire announced an integration with QualysGuard. To support increased product collaboration, Sourcefire is delivering a new Qualys Connector, which associates threats …

AuthenTec and UPEK to merge

AuthenTec, a provider of security, identity management and touch control solutions, and UPEK, a supplier of fingerprint solutions, announced that the companies have combined, …

TrueCrypt 7.0a released

TrueCrypt 7.0a has been released. This version contains a workaround for a bug in some custom (non-Microsoft) drivers for storage device controllers that caused a system crash …

Wireless car hacking due to poor security

Research from the University of California San Diego and the University of Washington – and which concludes that modern cars are susceptible to wireless hacking – …

Every week 57,000 fake Web addresses try to infect users

Every week, hackers are creating 57,000 new Web addresses which they position and index on leading search engines in the hope that unwary users will click them by mistake. …

nCircle updates PCI scan service

nCircle released a new version of its Certified PCI Scan Service that is fully compliant with the latest PCI DSS requirements. The new requirements improve the processes …

Week in review: Facebook’s remote logout, malware protection tips and a new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, articles and videos: Building secure web mashups In this video from OWASP AppSec Research 2010, …

Automated vs. manual security

In this video from OWASP AppSec Research 2010, David Byrne and Charles Henderson from Trustwave talk about automated vs. manual security.

Trojan attacks remain widespread

GFI’s statistics for the month of August show that users were under attack throughout the month primarily by the same Trojan horse programs that have persisted for …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools