New Mac Trojan copies successful Windows Trojan technique
Windows users have been warned time and time again of malware hiding behind icons and extensions belonging to files associated with legitimate software – most notably …
Over 300 cyberspy attacks against Russian targets discovered
Trend Micro researchers have discovered that 1465 computers belonging to 47 distinct political and economical entities in 61 different (mostly former Soviet Union) countries …
Suspected LulzSec and Anonymous arrested and charged
Three more alleged LulzSec and Anonymous members have been arrested by the FBI and/or indicted for their misdeeds, reports CNet. 23-year-old Cody Andrew Kretsinger (aka …
How to build a trusted virtualized platform
Trusted Computing Group (TCG) released the first Virtualized Platform Architecture, which describes how to build a trusted virtualized platform. With this specification, …
ICSA Labs launches network IPS testing program
ICSA Labs is launching a quarterly testing program for network intrusion prevention systems. The quarterly testing, which is available to all IPS manufacturers, is also an …
Veracode enhances its application risk management platform
Veracode, announced enhancements to its cloud-based application risk management platform that make it even easier to embed security verification processes into the software …
OpenStack Diablo to power global clouds
OpenStack, the open source cloud operating system, released Diablo, the fourth version of its community-driven software. OpenStack Diablo allows users to automate and control …
Tips for safe online shopping
Avira recommends that consumers watch for a few things in order to not become a victim of the online fraudsters: 1. Always check that the connection to the online store where …
FortiNet FortiAnalyzer XSS and script insertion vulnerabilities
Two vulnerabilities have been reported in FortiNet FortiAnalyzer, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to …
Is China behind the Japanese defense contractor hack?
Anonymous sources “in the know” regarding the investigation of the Mitsubishi Heavy Industries breach have hinted at the possibility that the attackers are …
Fake Diablo beta invites hitting inboxes
Since the third installment of the popular Diablo game franchise has been announced in 2008, fans all over the world have been impatiently waiting for it to become available. …
Fake stores dominant threat due to blackhat SEO
“Searches for buying software online remains 90 percent malicious, redirecting users to fake stores,” concluded Julian Sobrier recently, after having analyzed the …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform