Syrian dissidents claim government uses malware to spy on them
Syrian opposition activists have been targeted by the government since the start of the massive anti-government protests in January 2011, but only recently they have began to …
Researchers break video CAPTCHAs, offer solutions
After creating the “Decaptcha” software to solve audio CAPTCHAs, Standford University’s researchers modified it and turned it against text and, quite …
British student jailed for hacking Facebook
26-year-old software development student Glenn Mangham has been sentenced to spend eight months in jail following his hack into several Facebook servers between April and May …
Facebook Gold Membership Status scam hits users
A bizarre email purportedly sent by Facebook has been hitting inboxes around the world and trying to convince the recipients that they have been awarded a “100% Gold …
Security and SLAs, the biggest barrier to cloud adoption
45% of European IT decision makers view a lack of security and service level agreements (SLAs) as top concerns for moving to the cloud, according to a survey by Interxion. …
Trend Micro makes HijackThis open source
Trend Micro released HijackThis as an open source application. The code, originally written in Visual Basic, is now officially available at SourceForge. HijackThis scans your …
Acunetix Web Vulnerability Scanner 8 released
Acunetix Web Vulnerability Scanner 8 (WVS) echoes years of counter-hacking experience through its new ability to lock hackers out by integrating scan results into …
Forensic toolkit with malware analysis technology
AccessData released Forensic Toolkit 4 (FTK) that gives organizations affordable access to more advanced incident response and remote investigative capabilities. Using FTK, …
Week in review: Cheap cellphone tracking, Apple’s Gatekeeper, and Google secretly bypasses Safari’s “no tracking” settings
Here’s an overview of some of last week’s most interesting news and articles: Privacy pitfalls of online dating It used to be that you were pretty much anonymous …
Hackers can find you by tracking your cellphone
Finding out people’s approximate whereabouts by tracing their cellphone signal is something that service providers can easily do, as cellular networks track its …
Cutwail botnet intensifies spam spewing
The old Cutwail botnet is still alive and spamming from its 1,5 million bots, and has lately been spotted using malicious HTML attachments. The spam emails vary from fake …
Secret ad code allows Google to bypass Safari’s “no tracking” settings
Once again, Google has been caught doing something that it shouldn’t be doing: using code in their ads to intentionally bypass the privacy settings of Safari users in …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains