Cloud Computing: Automating the Virtualized Data Center
Cloud computing will revolutionize the way IT resources are deployed, configured, and managed for years to come. Service providers and customers each stand to realize …
Week in review: Stratfor breach, brute-forcing WAPs and an analysis of Facebook attacks
Here’s an overview of some of last week’s most interesting news: What’s in store for us in 2012 Looking forward into what lies ahead for us in 2012, Zscaler …
Microsoft releases MS11-100 for ASP.NET DoS attack
Today Microsoft released a security bulletin addressing a flaw in ASP.NET that was disclosed early morning yesterday at the Chaos Communication Congress (CCC) in Berlin. …
Brute-forcing wireless access points made easy
A design flaw in the WiFi Protected Setup that can allow attackers to easily brute-force their way into wireless network devices has been discovered and made public by …
Beware of password-protected documents carrying malware
Password-protected malicious attachments delivered via email are not a new occurrence – we have recently witnesses the tactic being used in the so-called Nitro attacks. …
Data-stealing Android Trojan masquerades as greeting-sending app
Text messages have largely replaced seasonal (and non) greeting cards, and there are mobile apps out there that let you send prewritten witty/sweet messages to friends and …
Analysis of Facebook attacks
Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …
SCADA and PLC vulnerabilities in correctional facilities
Many prisons and jails use SCADA systems with PLCs to open and close doors. Using original and publicly available exploits along with evaluating vulnerabilities in electronic …
Microsoft provides protection for ASP.NET vulnerability
Microsoft published Security Advisory 2659883 to provide a workaround to help protect ASP.NET customers from a publicly disclosed vulnerability that affects various Web …
Emerging threats to become major players in 2012
Emerging threats from 2011 are on track to become the major players for cyberactivity in 2012, including mobile banking, “legal” spam and virtual currency. McAfee …
Mac management tools from Google
Google’s internal Macintosh Operations team is starting to release the utilities, tools, and scripts for managing and tracking a fleet of Macintoshes in a corporate …
Pentagon officials allowed to use Android
US Department of Defense officials that need a mobile device are no longer restricted to using a BlackBerry, reports Muktware. The Pentagon has now also allowed the use of …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!