Microsoft names alleged Zeus bot herders
When Microsoft disrupted two of the most harmful botnets using Zeus malware in March, they also filed a lawsuit at the federal district court in New York against the bot …
Facebook API bug deletes contact info on users’ phones
If you thought that Facebook’s recent unannounced change of its users’ email address tied with their account to Facebook ones was bad, you’ll be livid if you …
SMS Trojan masquerades as Firefox for Android
Android users who have a preference for Russian third-party online Android markets should be on the lookout for a malware posing as the Firefox browser. The developers of this …
Malicious “Windows Live alert” email targets users
Windows Live account owners are currently being targeted with an email purportedly coming from the Hotmail Security Team, threatening them with an account suspension due to …
Bootable USB flash drive for secure remote working
Cryptzone released AppGate MOVE (My Own Virtual Environment), a USB flash drive that provides a portable way to access information and applications securely from any computer. …
Half of enterprise networks will be obsolete within five years
Technology trends such as BYOD, video and virtualization are rapidly consuming network capacity and capabilities, and 45 percent of the enterprise networks assessed during …
RIPS: Free PHP security scanner
RIPS finds vulnerabilities in PHP applications using static code analysis. By tokenizing and parsing all source code files RIPS is able to transform PHP source code into a …
Security appliance market continues to grow
According to IDC, both factory revenue and unit shipments grew in the first quarter of 2012 marking the eighth consecutive quarter of year-over-year growth. Worldwide factory …
Samsung samples first 16GB DDR4 modules
Samsung has begun sampling the industry’s first 16GB DDR4, registered dual inline memory modules (RDIMMs), designed for use in enterprise server systems. Using …
Mastering Windows Network Forensics and Investigation
Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book …
Blackhole exploit kit got upgraded
Phoenix and Blackhole are the most popular and widely used exploit kits because their creators are always tinkering with them and pushing out update and improved attack …
Fake “Tax Refund” emails targeting UK citizens
The UK tax season came to an end in April, and notifications about tax returns have begun slowly trickling down to the country’s citizens. But unfortunately among those …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)