Please turn on your JavaScript for this page to function normally.
New Trojan hijacks shortcuts to ensure its execution

A new information-stealing Trojan that seems to be Chinese in origin has been detected by Avira’ researchers. It is designed to steal usernames and passwords associated …

Gawker Media breach claimed by Gnosis

The credit for the breach of Gawker Media has been claimed by a group that goes by the name of Gnosis, and was apparently a way to get back at the company, its staff and its …

Gawker Media data breach linked to Twitter spam campaign

A recent security breach at Gawker Media which involved the leaking of user passwords for sites such as Gizmodo and Lifehacker, has now been linked to a widespread spam …

Using social networks safely

Everyone uses social networks like Facebook, Twitter or LinkedIn. Although these fantastic sites do have their upside, they also open users up to more computer viruses and …

First credit card with password generator

Gemalto launched the first credit card to combine one-time password security capabilities with standard payment. This innovation allows banks to provide a single card that …

ElcomSoft breaks Firefox, Safari, Opera, and Chrome passwords

Elcomsoft Internet Password Breaker now retrieves cached passwords stored in a variety of email clients and Web browsers. The new update adds Mozilla Firefox, Apple Safari, …

Portable multi-boot security suite Katana 2.0 released

Katana is a portable multi-boot security suite which brings together all of the best security distributions to run from one USB drive. Katana includes distributions which …

One in five card holders use birth date as PIN

Remembering passwords may seem the biggest problem you have when managing your e-mail or social network account, but that’s only because you don’t really believe …

RSYaba: Modular brute force attacker

RSYaba allows you to run brute force attacks against various services in a similar way to Hydra and Medusa. The tool is written in Ruby so modifying the scripts is a lot …

Five tips for safe computer use

Panda Security released a list of the top five tips that computer users should follow to ensure a safe and secure online experience. With the exponential growth of social …

Integrating Hydra with Nessus

The video below shows you how to integrate custom username and password dictionaries with Hydra to your Nessus scans.

Poor password practices and how to change them

When it comes to safeguarding personal information online, many people leave their virtual keys in the front door. A survey of more than 2,500 people from the United States, …

Don't miss

Cybersecurity news