Morto worm spreads via RDP, brute-forces Administrator accounts
There’s a new worm in town and it’s the first one that spreads by taking advantage of the Remote Desktop Protocol (RDP). “Once a machine gets infected, the …
Prototype for first virtualized ATM
For nearly 20 years, onboard computing technology has been at the core of the ATM. But, Diebold is leveraging virtualization technology to introduce a prototype for the …
Fake Facebook friend request, now with hidden iFrame
A slight variation of last week’s Facebook friend request spam email campaign has been spotted targeting the social network’s users, and this one employs a …
Google search results much cleaner than in 2010
It used to be that among the first ten pages of search results for popular terms, up to 90 percent of the offered links would take the users to a malicious page serving …
Slow HTTP DoS vulnerability test tool
Slow HTTP DoS attacks rely on the fact that the HTTP protocol, by design, requires requests to be completely received by the server before they are processed. If an HTTP …
VMware acquires PacketMotion
PacketMotion has been acquired by VMware. Terms of the acquisition were not disclosed. PacketMotion’s PacketSentry UAM solution has been extensively deployed in support …
Disaster preparedness tips for computers
ISACA offers tips to the public and businesses to protect their computers, information and systems during a natural disaster. “Ensuring personal and employee safety is …
PBConnex: Full-disk encryption with pre-boot networking
WinMagic launched SecureDoc with PBConnex, a full-disk encryption solution with pre-boot networking. PBConnex, an extension to SecureDoc, fully integrates network support …
CSA releases Cloud Controls Matrix 1.2
The Cloud Security Alliance (CSA) launched revision 1.2 of the Cloud Controls Matrix (CCM), available for free here. The CCM is designed to provide fundamental security …
Week in review: Digital forensics, new Facebook Privacy Settings and RSA phishing email found
Here’s an overview of some of last week’s most interesting news, articles and videos: Chinese mobile phone monitoring service found What do you think cyber crooks …
Is this the phishing email that caused the RSA breach?
“I forward this file to you for review. Please open and view it,” says simply the email that is thought to have been the means of deploying the backdoor that …
Illegal keygen for well-known AV solution leads to infection
An illegal key generator for the recently released latest version of the TrustPort Internet Security solution brings big trouble to unsuspecting users, warns BitDefender. …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware