Duqu: Another “most advanced” piece of malware
Rootkit.Duqu.A is the current star in the world of malware but, as history shows, that fame will be short-lived. Just like fashion models, modern malware has a lifespan in the …
Anonymous shuts down child porn sites, leaks usernames
Hacktivist group Anonymous has started a new campaign. Dubbed “Operation Darknet”, it aims to battle child pornography and ISPs that knowingly support and allow …
Consumers increasingly savvy about being online
Online consumers are increasingly savvy about being online, but many still do not employ all of the right tools to protect their privacy according to Anonymizer. While nearly …
Bug allows remote code execution in Chrome
In September ACROS Security notified Google about a peculiar behavior of the Chrome browser that can be exploited for execution of remote code outside Chrome sandbox under …
Microsoft YouTube channel hacked
A week after the official Sesame Street YouTube channel got compromised and started offering adult content to children, Microsoft’s official YouTube channel has been …
Scammers asking for donations for bogus Steve Jobs charity
Before his death, Apple CEO Steve Jobs was well known for not giving donations to charities or setting up foundations for various humanitarian causes, so it may come as a …
Security code review tool Agnitio 2.1 released
Agnitio is an application security tool developed by David Rook to help further the adoption of the Principles of Secure Development and to bring more repeatability and …
Encrypt and protect virtual machine images
HighCloud Security unveiled VM-Centric Security, a solution to encrypt and protect virtual machine (VM) images and the data they contain throughout their lifecycle. The …
Week in review: 250,000 hacker conversations analyzed, making a cheap mobile malware jail and Stuxnet’s successor Duqu
Here’s an overview of some of last week’s most interesting news, articles, interviews and podcasts: Testing web applications for security flaws David Hoelzer is …
Skype can be used to tie users to illegal download activity
A team of researchers has proved that it is possible to determine the IP address of a user and tie it with his Internet use, and even correlate this information to his …
Bloody photos of Gaddafi used as bait in malware-laden email run
As predicted, the violent death of Libyan dictator Moammar Gaddafi has been taken advantage of by cyber criminals in order to trick gore-hungry users into downloading malware: …
Nasdaq attackers spied on companies
The systems of the company that operates the Nasdaq Stock Market were breached many times last year, but the actual trading platform was never compromised. A subsequent …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!