software
SCADA systems flaws exploited to open prison doors
The discovery of the Stuxnet worm has alerted governments around the world about the possibility of industrial control systems being targeted by hackers and has made a lot of …
Fedora 16: Cloud and virtualization features
The Fedora Project announced the availability of Fedora 16, the latest version of its free open source operating system distribution. Notable feature enhancements include: …
iOS flaw allows App Store apps download malicious code
Since the App Store’s inception, Apple has been carefully examining applications submitted by third-party developers in order to assure its customers a malware-free …
One in nine Internet users surfing without protection
The number of new malware strains continues to rise. G Data Security Labs counted over 1.2 million new computer malware strains in the first half of the year alone. Despite …
Framework for analyzing web-based threats
Wepawet is a framework for the analysis of web-based threats. It uses a composition of tools and techniques to execute, trace, analyze, and characterize the activity of code …
Access Windows using your iPad and iPhone
Leostream Connect enables users to access secure and reliable Windows desktops and applications directly from their iOS device. This application allows an increasingly mobile …
Why do malicious Android apps come from China?
It seems like every time we hear about a malicious application aimed at Android users, it is always distributed by third-party Chinese app markets. You might wonder why the …
McAfee updates its Cloud Security Platform
McAfee announced the latest enhancements to its Cloud Security Platform which secures all primary channels of traffic – email, web and authentication – moving …
Barracuda Link Balancer XSS vulnerabilities
Two vulnerabilities have been reported in Barracuda Link Balancer, which can be exploited by malicious people to conduct cross-site scripting attacks, according to Secunia. …
Mobile screen-spy software recreates passwords
When one types text messages, emails and login credentials on one’s virtual iPhone or Android keyboard, larger bubbles containing each character pop up for a second …
New analytics advance IBM security intelligence portfolio
IBM is extending its proven security services portfolio to include enhanced analytic tools and services to provide deeper, real-time analysis of advance threats. By detecting …
IT Operations Analyzer gets expanded monitoring capabilities
Hitachi announced a new version of its IT Operations Analyzer, an integrated availability and performance monitoring tool that can help reduce complexity, streamline …
Featured news
Resources
Don't miss
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025
- Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028)