The danger behind low-volume email attacks
“Broad campaigns often spoof notifications from well-known businesses, establishments, organizations, and agencies, and are very widespread these days. However, smaller …
Info-stealing Trojan posing as Panda Cloud Antivirus
Researchers from Spanish antivirus vendor Panda Security are warning potential users about information-stealing malware disguised as their Panda Cloud Antivirus solution. The …
Netgear developer program ignites app creation
Netgear announced a new developer program for developers to create new apps to help customers get more out of the millions of Netgear devices purchased every month. Developers …
USBGuru simulated attack service
Wombat launched USBGuru, a simulated USB attack service to address the growing threat of fraud due to rogue memory devices loaded with malware. USBGuru is a …
Predicting Malicious Behavior
Predicting Malicious Behavior combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal …
iPhone-controlled keyless lock
Lockitron replaces keys with your phone. With Lockitron, you can instantly grant family, friends and guests access to your home or business from anywhere in the world using …
Week in review: White House Military Office breach, Brian Honan on infosec pros and the Incapsula review
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Interesting times for information security professionals Our modern …
Trojan disguised as image delivered via Skype messages
Skype users, beware of messages like this one: The spamming campaign has surfaced in the last few days and is being propagated via compromised Skype accounts. The offered …
Fake Rovio games for Chrome hijack browser
The popularity of Rovio’s Angry Birds game and its expansion packs are a guarantee for the success of their newly released Bad Piggies game, but unfortunately for those …
Microsoft acquires PhoneFactor
Microsoft has acquired PhoneFactor, a developer of multifactor authentication (MFA) solutions. “The acquisition of PhoneFactor will help Microsoft bring effective and …
Microsoft to release seven bulletins
Microsoft Security Bulletin Advance Notification for October 2012 contains seven bulletins, one critical and six rated as important. It should be a relief to many that none of …
Cloud Security Alliance outlines top mobile threats
The Cloud Security Alliance (CSA) Mobile Working Group released findings from a new survey that calls out the specific security concerns enterprise executives say are the real …
Featured news
Resources
Don't miss
- Netscaler vulnerability was exploited as zero-day for nearly two months (CVE-2025-6543)
- WinRAR zero-day was exploited by two threat actors (CVE-2025-8088)
- APT groups are getting personal, and CISOs should be concerned
- What makes a security program mature and how to get there faster
- EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations