Please turn on your JavaScript for this page to function normally.
Log review checklist for security incidents

Anton Chuvakin, the well-known security expert and consultant in the field of log management and PCI DSS compliance and author of many books, and Lenny Zeltser, leader of the …

Mariposa bot distributed by Vodafone’s infected phone

Following yesterday’s news about the Energizer DUO USB recharger that infects PCs with a Trojan, here is another piece of equipment whose software comes bundled with …

Setting up a mobile botnet is alarmingly easy to do

The relative easiness of setting up a mobile botnet of nearly 8,000 phones has been demonstrated by Derek Brown and Daniel Tijerina at this year’s edition of the RSA …

“Highly critical” Opera vulnerability discovered

A highly critical buffer overflow vulnerability affecting the Opera browser has been discovered by Marcin Ressel of Secunia: The vulnerability is caused due to an error when …

Serious Apache vulnerability disclosed

A serious vulnerability in Apache’s HTTP web server that enables the attacker to gain remote access to the server and total control of a database, has been discovered by …

There is a social engineering scheme for everyone

The human factor is the weakest link of the security chain – this statement has been said and written so many times, that is starting to become a cliche’. Even so, …

USB battery charger installs Trojan

The software that shows to which extent the battery is charged through the Energizer DUO USB recharger comes bundled up with a Trojan, says US CERT. The installer file for the …

Zuckerberg hacked into journalists’ email?

The renowned Facebook co-founder has been accused three years ago of stealing the source code and the business plan for the social network from some Harvard colleagues and for …

Fake drug peddlers hijack academic websites

Legal sites are often compromised and used as a stepping stone through which the user is taken to a malicious site. The latest of this kind of schemes has seen a string of …

Is there a solution to the ZeuS problem?

Zeus Trojan has for a while now become almost a synonym for banking malware. Its sneakiness and the ability of its makers to constantly change and adapt it would be admirable, …

Malicious files with fake digital signatures

Signing malicious files with fake signatures that at first glance seem authentic is one of the new methods used by malware writers to add an air of legitimacy to them and …

DHS casting its nets for cybersecurity experts

Glancing about the room at the great number of RSA Conference attendees that came to hear her speak, Secretary of Homeland Security Janet Napolitano announced the …

Don't miss

Cybersecurity news