D-Link patches critical vulnerability in older routers
D-Link has released firmware patches for a number of its older routers sporting a critical authentication security bypass vulnerability discovered in October. The flaw was …
Shopping convenience overrides security concerns
Tripwire announced the results of a survey on mobile security and holiday shopping. The survey was conducted by Dimensional Research and OnePoll from November 18-20, 2013, and …
Beware of fake PayPal “Account Access Limited” phishing email
Fake PayPal emails claiming recipients will have limited access to their account because they didn’t provide enough information have been landing for the last few days …
Akamai to acquire Prolexic
Akamai and Prolexic have signed a definitive agreement for Akamai to acquire Prolexic, a provider of cloud-based security solutions for protecting data centers and enterprise …
OS X hardening tips
OS X security is evolving: defenses are improving with each OS release but the days of “Macs don’t get malware” are gone. Recent attacks against the Java Web …
Week in review: Cyber Monday dangers, Twitter adds Forward Secrecy, and a Linux worm that targets the Internet of Things
Week in review: Here’s an overview of some of last week’s most interesting news, videos and articles: Innovations that will shape network security Responding to an …
Experts predict widespread attacks on online banking users
Kaspersky Lab has recorded several thousand attempts to infect computers used for online banking with a malicious program that its creators claim can attack “any bank in …
Browser scan unveils an abundance of critical vulnerabilities
Through our Qualys BrowserCheck online tool we have collected data from over 1.4 million user computer scans and their respective browsers. From this research, we have found …
Can we expect a cyberwar resurgence?
Neohapsis security experts predict that next year there will be a cyberwar resurgence, the cloud will begin to show its hidden costs, and privacy will continue to lose in the …
Verify your software for security bugs
Verification is an important phase of developing secure software that is not always addressed in depth that includes dynamic analysis and fuzzing testing. This step allows …
A new Linux worm targets the Internet of Things
A new Linux worm – luckily still not spotted being used in the wild – has been unearthed by Symantec researchers. Dubbed “Darlloz”, its targets are not …
Researchers track down members of Nigerian cyber gang
A cybercriminal gang based in Nigeria has been setting up phishing and 419 scam campaigns as well as delivering information-stealing malware to targets around the world, say …