Banking Trojan masquerading as Chrome installer
Brazilian and Peruvian users looking to install Google’s Chrome browser are in grave danger of downloading information-stealing malware instead. “We recently found …
Facial recognition technology for user authentication
DigitalPersona announced the latest release of its enterprise software which builds upon its existing support for a wide variety of user authentication methods by including …
Manage Windows event logs with Event Log Explorer
FSPro Labs released Event Log Explorer 4, designed to view, monitor and analyze events recorded in Security, System, Application and other logs of Microsoft Windows operating …
Intel strengthens security of its Core vPro platform
Intel announced the availability of its 3rd Generation Intel Core vPro processor-based platforms for business and intelligent systems. New capabilities embed security at every …
Online travel most vulnerable to email attacks
Agari released its first TrustIndex, a quarterly measurement that applies Agari’s big data insights to score email attack vulnerability and email trust by industry. …
Apple security update fixes QuickTime vulnerabilities
Apple just released an advisory addressing 17 security flaws in QuickTime Media Player. The update is rated critical as several of the fixed vulnerabilities can be used to …
Inside Windows Debugging
Rethink your use of Windows debugging and tracing tools, and use Inside Windows Debugging to learn how to make them a key part of test-driven software development. Led by a …
Avira Antivirus update wreaks havoc on millions of PCs
If you are a user of any of the paid versions of Avira’s various antivirus and security software and you have tried to update it/them in the last 24 hours, chances are …
Apple ships Flashback removal tool for OS X 10.5 Leopard
Following the discovery of a 600K strong Flashback botnet, Apple has been trying to undo the damage to its reputation and has worked on issuing tools, patches and updates …
Environmentally hardened encryption appliance
Certes Networks announced the introduction of their newest encryption appliance, the CEP5 LC. Developed for organizations requiring secure traffic flows to remote locations, …
Pinterest scam toolkits widen the pool of potential scammers
Seemingly overnight, Pinterest gained massive momentum, making cyber scammers sit up and take notice, then jump right in. But the opportunities the site gives to those looking …
Zeus exploits users of Facebook, Gmail, Hotmail and Yahoo!
Trusteer discovered a series of attacks being carried out by a P2P variant of the Zeus platform against users of Facebook, Google Mail, Hotmail and Yahoo – offering …
Featured news
Resources
Don't miss
- Croatian research institute confirms ransomware attack via ToolShell vulnerabilities
- Microsoft fixes “BadSuccessor” Kerberos vulnerability (CVE-2025-53779)
- Fortinet warns about FortiSIEM vulnerability with in-the-wild exploit code (CVE-2025-25256)
- AWS CISO explains how cloud-native security scales with your business
- Product showcase: Apricorn Aegis NVX, a high-security, portable SSD