Please turn on your JavaScript for this page to function normally.
Browser scan unveils an abundance of critical vulnerabilities

Through our Qualys BrowserCheck online tool we have collected data from over 1.4 million user computer scans and their respective browsers. From this research, we have found …

vBulletin.com hacked, hackers trying to sell info on 0-day used

The developers of popular Internet forum software vBulletin have announced late on Friday that their network has been attacked and successfully breached, and that the hackers …

Microsoft delivers eight security bulletins

The November Patch Tuesday advisories are out, and across the board mixed feelings own the day. Relief and frustration must be present for Windows and Security administrators …

Upcoming Patch Tuesday to bring both relief and frustration

The November Patch Tuesday Advance Bulletin is out and I think everyone is breathing a sigh of both relief and frustration. Relief because for the first time in a few months, …

Microsoft and Facebook start Internet-wide bug bounty program

Dubbed The Internet Bug Bounty, it is sponsored by the two Internet giants and is aimed at anyone who discovers vulnerabilities in a series of open source programming …

Another Android “master key” bug revealed

The existence of another “master key” bug that can be used to push malware onto Android users has been publicly disclosed by Jay Freeman (a.k.a Saurik), the …

New Microsoft 0-day vulnerability under attack

Microsoft has released security advisory KB2896666 informing of a vulnerability (CVE-2013-3906) in the TIFF graphics format that is seeing limited attacks in the Middle East …

Network IDS reduces “white noise” for more focus on critical vulns

RandomStorm has announced the latest release of its next generation network intrusion detection system (NIDS), StormProbe. StormProbe analyses all network traffic, using more …

RSA takes a big data approach to help with high-risk threats

RSA, The Security Division of EMC, at RSA Conference Europe 2013 unveiled RSA Vulnerability Risk Management (VRM), a new software solution designed to help organizations …

Bypassing security scanners by changing the system language

A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that a computer system can be set up to …

The Internet of Things: Vulns, botnets and detection

Does the Internet of Things scare you? It probably should. This DerbyCon video discusses why embedded device security is laughably bad, handling vendor notification, and …

Digital ship pirates: Researchers crack vessel tracking system

In the maritime business, Automated Identification Systems (AIS) are a big deal. They supplement information received by the marine radar system, are used for a wide variety …

Don't miss

Cybersecurity news