Microsoft issued Fix it for actively exploited IE 0-day
Microsoft has yesterday unexpectedly released a security advisory warning users about instances of active exploitation of a vulnerability found in all supported versions of …
LynuxWorks releases a rootkit detection system
LynuxWorks announced the RDS5201, a new product to help detect the rootkit. Built on the LynxSecure 5.2 separation kernel and hypervisor, this small-form-factor appliance has …
Recommendations for strengthening cyber security policies
McAfee and the Digital Government Security Forum (DGSF) released a new report which explores the cyber risks confronting government and offers recommendations to mitigate …
Firefox 24 delivers 17 security updates
Mozilla released Firefox 24, which includes 17 security updates: seven are critical, four high, and six moderate. Fixed in this version: MFSA 2013-92 GC hazard with default …
USB “condom” protects from mobile device juice jacking
A group of Georgia Tech researchers has created quite a stir at this year’s Black Hat conference when they showcased chargers capable of installing malware on iPhones, …
Self-healing BIOS security from HP
HP announced HP BIOSphere with SureStart technology, a self-healing security solution created to help organizations better manage risk and protect user and IT productivity. HP …
Kaspersky Lab launches solution for multi-device security
Kaspersky Lab announced Kaspersky Internet Security – Multi-Device, a new security product that provides a way for customers to secure their Internet activity across …
Software for DIY data recovery, data protection and data destruction
Kroll Ontrack announced Ontrack EasyRecovery 11, a solution for DIY data recovery, data protection and data destruction. It includes new S.M.A.R.T. scan technology to monitor …
Mobile Pwn2Own: $300k prize pool awaits successful contestants
The next Mobile Pwn2own competition is to be held in November at the PacSec Applied Security Conference in Tokyo, and contestants can earn as much as $100,000 for a successful …
Too long passwords can DoS some servers
The discovery of a vulnerability in popular open source web application framework Django has recently demonstrated that using a long password is not always the best thing to …
30 Percent of transactions conducted from Tor are fraudulent
iovation announced that 30.2 percent of transactions conducted from Tor (the onion router) in August were fraudulent. This compared with an overall fraud rate of 1 percent for …
Researchers create undetectable layout-level hardware Trojans
The fact that most of computer hardware is produced outside the US and Europe has long presented a worry for the governments of those countries and for the companies and …
Featured news
Resources
Don't miss
- Why work-life balance in cybersecurity must start with executive support
- Reconmap: Open-source vulnerability assessment, pentesting management platform
- Microsoft will start removing legacy drivers from Windows Update
- CoinMarketCap, Cointelegraph compromised to serve pop-ups to drain crypto wallets
- Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777)