Please turn on your JavaScript for this page to function normally.
WordPress 3.0.5 security update

WordPress 3.0.5 is now available and is a security hardening update for all previous WordPress versions. This security release is required if you have any untrusted user …

Free guide: Top 10 reports for managing vulnerabilities

New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires …

The dark side of the new Android Market

A new version of the Android Market has just been launched, making it possible for every device owner to look for applications, buy or even remotely install apps to an Android …

Facebook bug allows user data theft via specially crafted websites

A proof-of-concept attack page that exploits a Facebook vulnerability to access a user’s private data has been devised by two students who shared the information with …

Serious jump in new vulnerabilities exploitation

On a typical month, exploit activity falls between 30 percent and 40 percent, according to Fortinet. Half of new vulnerabilities rated as “critical” were targeted …

VLC 1.1.7 fixes security issue

VideoLAN unveiled VLC 1.1.7, a security update on 1.1.6. When parsing an invalid MKV (Matroska or WebM) file, input validation are insufficient. If successful, a malicious …

Could a vulnerability tax spur vendors to improve security?

He has recently been appointed as Apple’s global director of security and he is expected to begin his work in March, but former National Security Agency cryptographer …

Vulnerabilities in Cisco WebEx conferencing applications

Core Security Technologies disclosed stack overflow vulnerabilities affecting the Cisco WebEx applications used to conduct Web-based video conferencing. They identified two …

Microsoft Windows MHTML XSS vulnerability

A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to conduct cross-site scripting (XSS) attacks, according to Secunia. The …

Multiple vulnerabilities in Symantec products

Multiple vulnerabilities have been reported in Symantec products, which can be exploited by malicious people to cause a Denial of Service and compromise a vulnerable system, …

The vulnerability species: Origin and evolution

There is an on-going arms-race in the IT security industry between vendors striving to produce secure software, and researchers’ and cybercriminals’ efforts (and …

ICQ’s critical flaw allows attackers to serve malicious software update

ICQ – the popular instant messaging application – has a gaping security hole that can allow attackers to execute malicious code on the targeted system, says …

Don't miss

Cybersecurity news