Global phishing trends and domain name use
A new survey by the Anti-Phishing Working Group (APWG) reveals that phishing attacks perpetrated against Chinese e-commerce and banking sites soared by 44 percent in the first …
Adobe patches Shockwave Player
Critical vulnerabilities have been identified in Adobe Shockwave Player 11.6.1.629 and earlier versions on the Windows and Macintosh operating systems. These vulnerabilities …
Motorola attempted to crush competitor via “Chinese spy ring” allegations
Four years ago a software engineer that worked for Motorola was arrested by U.S. Customs agents as she was trying to board a plane heading for China. Hanjuan Jin was carrying …
Fake Kaspersky AV solution offered via spam emails
Rogue AV software mimicking popular legitimate AV solutions is occasionally offered by cyber crooks in the hopes that the familiar name and look will entice users into buying …
First military-secured 3G and 4G core network
Tecore Networks introduced the 4G evolution of its military-secured iCore platform, making it the world’s first complete, multi-technology mobile network. By …
Computershare insider loses USBs with stolen customer financial data
Computershare, one of the largest financial market services and technology providers in the world, has filed a suit with the Massachusetts District Court against former …
Angry Birds know where you live
75% of the public may be giving away their physical location when downloading smartphone applications, according to AdaptiveMobile. 69% of smartphone users are adamant that …
Protection against Duqu malware
A new vulnerability in Windows has been recently identified and is already exploited in the wild. For now, only a handful of targeted attacks have been found. The …
Firefox 8.0 brings security and stability fixes
Mozilla released Firefox 8.0 that fixes several security and stability issues. Add-ons installed by third party programs are now disabled by default, as if add-on management …
Hardware-based enterprise key management platform
Escalating threats, expanding regulatory requirements, and the movement to cloud-based and virtualized infrastructures are driving the need for a more unified approach to …
New cloud computing credential
CompTIA and ITpreneurs are collaborating on a new cloud computing skills credential. The Cloud Essentials exam, scheduled for availability in December 2011, will validate …
Light Patch Tuesday features four bulletins
For the November Patch Tuesday, Microsoft released four bulletins that fix vulnerabilities targeting Windows. One is marked as critical, two are important, and the last one is …
Featured news
Resources
Don't miss
- Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads