Please turn on your JavaScript for this page to function normally.
Sun Java by far the most vulnerable plug-in

Wondering how secure your browser is? Today at the RSA Conference in San Francisco, Qualys CTO Wolfgang Kandek presented their research which clearly shows that browser …

124 new advanced evasion techniques discovered

Stonesoft announced it has discovered 124 new advanced evasion techniques (AETs). Samples of these AETs have been delivered to the Computer Emergency Response Team (CERT-FI), …

Multiple vulnerabilities in Django

Vulnerabilities have been reported in Django, which can be exploited by malicious people to bypass certain security restrictions and conduct script insertion and cross-site …

Ruby on Rails CSRF protection bypass vulnerability

There is a vulnerability in Ruby on Rails which could allow an attacker to circumvent the CSRF protection provided. The issue affects versions 2.1.0 and above and has been …

Adobe Reader X critical vulnerabilities patched

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and …

Microsoft patches 22 vulnerabilities

Today Microsoft released 12 security bulletins, three rated Critical and nine rated Important. They address a total of 22 unique vulnerabilities in Microsoft Office, Windows, …

HTC Twitter client security issue

A security issue exists in multiple HTC products and can be exploited by malicious people to disclose potentially sensitive information, according to Secunia. The security …

WordPress 3.0.5 security update

WordPress 3.0.5 is now available and is a security hardening update for all previous WordPress versions. This security release is required if you have any untrusted user …

Free guide: Top 10 reports for managing vulnerabilities

New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires …

The dark side of the new Android Market

A new version of the Android Market has just been launched, making it possible for every device owner to look for applications, buy or even remotely install apps to an Android …

Facebook bug allows user data theft via specially crafted websites

A proof-of-concept attack page that exploits a Facebook vulnerability to access a user’s private data has been devised by two students who shared the information with …

Serious jump in new vulnerabilities exploitation

On a typical month, exploit activity falls between 30 percent and 40 percent, according to Fortinet. Half of new vulnerabilities rated as “critical” were targeted …

Don't miss

Cybersecurity news