Yale confirms 10-month-long data breach
Names and Social Security numbers of some 43,000 people that were affiliated with Yale University back in 1999 have been accessible to users of the Google search engine for …
Fake Facebook friend request email leads to malware
Facebook users are once again being targeted with fake emails purportedly coming from the social network, alerting them to a friend request. A click on the offered …
Skype XSS vulnerability allows malicious code injection?
According to a German researcher, a XSS bug in the latest (5.5.0.113) Skype version for Windows could allow attackers to inject malicious code into users’ phone sessions …
Malware targeting Android jumps 76 percent
The amount of malware targeted at Android devices jumped 76 percent since last quarter, to become the most attacked mobile operating system, according to McAfee. 2011 has also …
$100,000 for open source security projects
Rapid7 created a $100,000 investment fund to support up to seven promising open source projects in the security industry. The “Magnificent7” projects will be …
Critical bug found in latest PHP release, users advised against updating
PHP users are advised against upgrading to the latest (5.3.7) release of the scripting language because a critical flaw has been spotted only a day before its release. The bug …
One click away from digital disaster
61 percent of consumers click on links while online that take them to unexpected places, making them vulnerable to cyberattacks that can lead to identity theft, according to …
Ramnit worm uses Zeus Trojan tactics for banking fraud
Trusteer discovered the 18 month old file infecting worm Win32.Ramnit has morphed into financial malware and is actively attacking banks to commit online fraud. Ramnit …
Multiple vulnerabilities in Google Chrome
Multiple vulnerabilities have been reported in Google Chrome, where some have unknown impacts and others can can be exploited by malicious people to bypass certain security …
Privacy screen protection for iPhone and iPad
3M released its range of protection films optimized for tablet PCs and the Apple iPhone. The range consists of two product lines, one delivers visual security from prying eyes …
The Basics of Information Security
As part of the Syngress Basics series, The Basics of Information Security will provide the reader with fundamental knowledge of information security in both theoretical and …
WikiLeaks defector destroyed 3,500+ unpublished files
It seems that the long awaited WikiLeaks leak containing documents regarding Bank of America will not be happening in the near or possibly not in any kind of future, since the …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)