Most Americans uninformed about DDoS attacks
Whether motivated by an extreme form of free expression or criminal intent, distributed denial-of-service attacks (DDoS attacks) are increasingly commonplace worldwide. Yet …
Webroot adds anti-phishing to Web Security Service
Webroot announced the integration of anti-phishing capabilities into the Webroot Web Security Service, a cloud-based security service. The challenges in the detection of …
Fake Windows 8 key generators lurk in the wild
Users who are eager to try out the new Windows 8 but are not keen on buying it should be careful if searching for bootlegged copies or purported key generators online, Trend …
Fraud 101 for universities
“Colleges and universities are becoming more aware of the fraud threats they face, but there is still a lot of room for educating the educators,” says James Gifas, …
Dell updates cloud software for iPad and Windows RT
Dell announced enhancements to its PocketCloud app portfolio, which enables users to easily create a “personal cloud” to search, view, organize, and share content …
Xen Cloud Platform 1.6 released
Xen Cloud Platform is a virtualization platform for companies to create and manage virtual infrastructures for servers, desktops and clouds. XCP 1.6 strengthens its server …
Hardcoded account in Samsung printers provides backdoor for attackers
US-CERT has issued an alert warning users of Samsung printers and some Dell printers manufactured by Samsung about the presence of a hardcoded account that could allow remote …
Researchers finds 23 vulnerabilities in SCADA software
The recent revelation that Malta-based start-up ReVuln is offering only to paying customers information about SCADA zero-day vulnerabilities has spurred security researcher …
Piwik.org compromised, offered Trojanized version of analytics software
The official website of popular free web server analytics system Piwik has been compromised and made to serve a Trojanized version of the software that opens a backdoor on the …
SCADA software bugs leave national critical infrastructure vulnerable
This week, 23 vulnerabilities in industrial control software – specifically SCADA software – from several vendors have reportedly been found by a researcher at …
Go Daddy says DNS records hijacking was due to phishing
Last week malware peddlers have managed to compromise the DNS records of Go Daddy hosted websites so that they would redirect victims to malicious sites hosting the Cool …
Cyber-Ark secures privileged accounts
Cyber-Ark Software announced its Privileged Identity Management Suite for Critical Infrastructure Protection (PIM/CIP), which secures critical infrastructure by preventing the …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)