Trojan uses anti-spam system to keep in touch with C&C servers
Most malware is severely crippled if it can’t contact the C&C servers from which it receives its instructions and updates, so malware authors are constantly coming …
How taxpayers can protect themselves against identity theft
ThreatMetrix has identified the top precautions taxpayers should take when e-filing to protect their returns against cybercriminals. According to Forbes, more than 80 percent …
AV developer Avast starts bug bounty program
Avast, the Prague-based maker of the popular eponymous AV software, has announced the introduction of a bug bounty program. Rewards are offered only for security-related bugs …
Vormetric Vault: Manage certificates, keys and security objects
Vormetric announced Vormetric Vault, an all-in-one scalable solution for protecting and managing digital certificates, encryption keys and other security objects such as …
WordPress 3.5.1 fixes 37 bugs
WordPress 3.5.1, now available for download, is a maintenance and security release for all previous versions that fixes 37 bugs. WordPress 3.5.1 also addresses the following …
Hackers the movie: A retrospective
In this lecture, Don A. Bailey will take a look back at another great milestone in information security: the movie Hackers. In this retrospective from Hack in The Box 2012, …
Week in review: Backdoors in Barracuda appliances, and what makes a good information security professional?
Here’s an overview of some of last week’s most interesting news, reviews, videos, interviews and articles: Newest Java update doesn’t fix fresh critical …
GitHub’s new search reveals passwords and private keys
GitHub, the popular online source code repository, has unveiled on Wednesday a new search infrastructure that should help coders find specific code within the millions of the …
Cutwail botnet on spam rampage, delivers Cridex worm
Since its inception some six years ago, the Cutwail / Pandex botnet experienced its fair share of setbacks, but it’s still going strong. The main reason for its …
How to avoid Facebook scams and limit the damage they make
Last week I wrote about the most common Facebook scams, the reasons why they are perpetually so successful, and what the scammers who set them up are after. Today I will …
SCADA password cracking code available
ICS-CERT has issued an alert about the existence and general availability of the proof-of-concept exploit code for a tool that can brute force passwords and thus gain access …
Create a secure browsing session on any Windows computer
Making online purchases and secure internet browsing is safer and easier than ever with the launch of Kanguru’s new Defender DualTrust, a new secure online access and …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous