Spam king facing criminal charges for Facebook spamming
Sanford “Spamford” Wallace has long been a thorn in the side of social networks and has already been successfully sued in civil court by the FCC, MySpace and …
Hacktivists are “villains”, say IT security pros
The majority of IT security professionals have – unsurprisingly – a negative opinion of “hacktivists”, say the results of a survey of 211 attendees at …
Amazon extends cloud access, enables “identity federation” for accessing it
Amazon Web Services has extended Amazon Virtual Private Cloud (Amazon VPC) to all AWS Regions, allowing enterprises to launch their Amazon VPC environments in the US East and …
Scanning thousands of Web apps in days, not months
Faced with the reality that exploiting a single SQL Injection vulnerability or cross-site scripting (XSS) error in any web application could take down an organization’s …
DHS equates Anonymous with APTs
Despite judging Anonymous’ tactics, techniques, procedures and tools to be rudimentary, the US Department of Homeland Security equates their successful deployment with …
Penetration testing for mobile phones
Core Security announced the Core Impact Pro v12 penetration testing software, a commercial-grade solution that pinpoints security exposures in Android, BlackBerry and iPhone …
Coding error reveals RSA attackers operated from China
A simple error message returned by a server to which a malware sample was trying to connect revealed to Dell SecureWorks researchers the origin of the RSA attack, says Joe …
Free password reset self service solution for SMBs
Nervepoint Technologies announces the launch of Access Manager Self Service, a free Password Self Service solution for SMBs. With almost zero-configuration, the service …
Web application security on a new level
Qualys announced QualysGuard WAS 2.0, enabling organizations to leverage the power and scalability of the cloud to discover, catalogue and scan large numbers of web …
Cisco warranty CDs take users to malware site
Cisco has issued a warning about information packet and warranty CDs shipped to its own customers between December 2010 and August 2011, saying that they contain a reference …
“You look like you lost weight” Twitter scam
Direct Messages saying “You look like you lost weight in this video” are the latest approach used by cyber crooks to harvest Twitter login credentials, warns …
Automated malware analysis for businesses
GFI released GFI SandBox 3.4 (formerly CWSandBox), the latest update to their malware analysis tool that helps security professionals assess suspected files and URLs for …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware