PoC exploits for Linux privilege escalation bug published
The publication of proof-of-concept exploit code for a recently spotted privilege escalation flaw (CVE-2012-0056 ) in the Linux kernel has left Linux vendors scrambling to …
User error is the biggest threat on the Internet
Sophos unveiled a detailed assessment of the threat landscape – from hacktivism and online threats to mobile malware, cloud computing and social network security, as …
Compromised Tumblr accounts sporting fake Starbucks gift cards
It is a well known fact that compromised legitimate websites are often used by cyber crooks to drive traffic towards their scammy sites. The latest example of this practice …
Symantec advises customers to stop using pcAnywhere
In a perhaps not wholly unexpected move, Symantec has advised the customers of its pcAnywhere remote control application to stop using it until patches for a slew of …
Protect your online image with tips from Microsoft
In observance of Data Privacy Day 2012, Microsoft is releasing new data about consumer behaviors online and is offering guidance and tips to help people better manage their …
Malicious QR codes and the persistence of rootkits
Cybercrime has come a long way since it was mostly a digital form of vandalism. It has developed into a criminal business operated for financial gain and is now worth …
Endpoint security through whitelisting
The latest release of McAfee Application Control is integrated with McAfee Global Threat Intelligence to show the file reputation of every file in the enterprise. This feature …
Computer Security Fundamentals, 2nd Edition
This book brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. It …
Organizations to replace BI functions with cloud offerings
Nearly one third of organizations either already use or plan to use cloud or software-as-a-service (SaaS) offerings to augment their core business intelligence (BI) functions, …
Critical flaws in Symantec’s pcAnywhere patched
After having been notified by Symantec about the theft of the software’s old source code and the increased security risk that incident entails for them, users of the …
“Chuck Norris is dead” Facebook scam
Chuck Norris, the popular martial artist/ actor whose “tough guy” image has spawned a countless jokes and memes on the Internet, has been killed off by Facebook …
“Frankenmalware” active in the wild
If you’re not careful and you don’t use anti-malware software, you might end up with various viruses, Trojans and worms on your computer. But, according to …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services