Secure operating system Qubes officially released
“After nearly three years of work, I have the pleasure to announce that Qubes 1.0 has finally been released,” Joanna Rutkowska, Founder and CEO of Invisible Things …
Spoofed Microsoft notification leads to Zeus
Microsoft has updated its Services Agreement last week, and has begun notifying its users about the change via email. Eager to take advantage of any kind of legitimate opening …
The top Internet dangers for kids
As the Internet plays an increasingly prominent role in children’s lives, parents are getting increasingly worried about the ease with which undesirable content can be …
Network Management: Principles and Practices, 2nd Edition
Network Management: Principles and Practices, 2nd Edition is thoroughly updated and expanded to address broadband network management and the latest trends in the network …
Week in review: Java 0-day finally patched, and fast and furious reverse engineering
Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: Fast and furious reverse engineering Tomislav Pericin is one of …
Virus shuts down gas company’s site and offices
The official website and the email servers of Ras Laffan Liquefied Natural Gas Company – the world’s second largest liquefied natural gas company which distributes …
Fake UPS notices deliver malware
Cyber crooks have once again resurrected the old UPS spam email campaign in order to deliver their malicious wares to Internet users, warns Webroot’s Dancho Danchev. As …
Oracle patches Java 0-day, researchers say there’s another one
Oracle has finally issued an update for Java 7 (v 1.7.0_07) which solves the problem of the CVE-2012-4681 vulnerability (which actually consists of two distinct flaws). The …
Chimera: A declarative language for streaming network traffic analysis
Intrusion detection systems play a vital role in network security. Central to these systems is the language used to express policies. Ideally, this language should be …
Effective MySQL Backup and Recovery
Effective MySQL: Backup and Recovery offers a no-nonsense approach to one of the most critical tasks of an operational DBA—performing, testing, and verifying backup and …
AV-killing worm spreads via Facebook chat and IM clients
A rather industrious piece of malware that – among other things – paves the way for other malware by disabling AV solutions and software update modules has been …
Kaspersky Lab publishes research about Wiper
In April 2012 a series of incidents were publicly reported about a destructive malware program, codenamed Wiper, which was attacking computer systems related to a number of …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)