Surge in pre-Christmas malware
GFI Software released its report on the most prevalent threat detections for the previous month. Noteworthy threats in November 2011 included a new Facebook worm; the return …
Free tool exploits SQL injection vulnerabilities
NT OBJECTives announced NTO SQL Invader, a free tool which provides pen testers and developers the ability to quickly and easily exploit and demonstrate SQL Injection …
Tips for securing Internet connected devices
From the hottest new tablet to sleek smartphones and laptops, electronic devices are likely at the top of many consumers’ holiday wish lists this year. Many lucky …
Free data loss prevention tool for enterprise IT
STEALTHbits released of DLP Lite for File Systems, a free, regex DLP tool that aids organizations in identifying high-risk, unsecured content on their networks to mitigate the …
Secure remote access from SonicWALL
The proliferation of powerful smartphones and tablets poses a new problem for IT: providing secure remote access to network resources for a growing number of employees who use …
8 out of 10 applications fail to meet security standards
Considered “low hanging fruit” because of their prevalence in software applications, XSS and SQL Injection are two of the most frequently exploited …
Zero-day Adobe Reader flaw exploited in ongoing attacks
Adobe has issued a security advisory notifying users about a newly discovered and still unpatched vulnerability in Adobe Reader and Adobe Acrobat which has been spotted being …
Top 5 Android malware families
On November 15, Gartner issued a report that cited Google’s Android mobile operating system had reached a global 52.5% smart phone market share, while iOS trailed in …
Personal information of 3.5 million poker players leaked
Personal data of some 3.5 million users of the Ultimate Bet poker website have been made available for download on an online forum for a short time. The data included the …
Fake Verizon notification carries malware
A sneaky spam email campaign aiming to infect users with a banking Trojan is currently underway and is targeting mobile carrier customers, warns Microsoft. The email purports …
Patch management integration with Nessus
Tenable Network Security announced that Nessus and SecurityCenter now integrate with top patch management solutions.: Red Hat Network Satellite Server, Microsoft Windows …
Proactive detection of cyber security incidents
ENISA today launched a report which identifies 16 shortcomings in detection of network security incidents. The report reveals that not all available tools are used widely …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down