Apple releases iOS 4.3.5
Apple released iOS 4.3.5, which can be downloaded and installed using iTunes. A certificate chain validation issue existed in the handling of X.509 certificates. An attacker …
Enterprises fail to control mobile access
The results of a Courion survey of 988 IT decision makers at large organizations indicate that whilst organizations are confident that they can assure appropriate user access …
Most workaholics don’t secure their mobile devices
Bags packed, flights booked and foreign currency in their pockets. The workforce might be jetting off but they’re definitely not leaving the daily grind behind. Instead, …
D-Link integrates OpenDNS on select routers
D-Link announced the integration of OpenDNS technology into select routers. With OpenDNS technology, D-Link routers offer consumers Web content filtering and security …
CompTIA introduces healthcare IT technician certificate
A new professional credential aimed at information technology (IT) professionals who install, manage and troubleshoot electronic health records systems for the nation’s …
Hackers steal 8 GB of data from Italian anti-cybercrime unit
Evidence servers of the Italian National Anti-Cybercrime Center for the Protection of Critical Infrastructure (CNAIPIC) have been breached and some its contents published by a …
SecurID users targeted by fake NSA email
RSA’s SecurID token users have recently been targeted with fake emails supposedly coming from the US National Security Agency urging them to update their token code …
phpMyAdmin multiple vulnerabilities
Multiple vulnerabilities have been reported in phpMyAdmin, according to Secunia. These can be exploited by malicious users to conduct cross-site scripting attacks and …
Japanese man arrested for storing malware
38-year-old Yasuhiro Kawaguchi is the first person in Japan to get arrested for storing malware on his computer after the upper house’s Judicial Affairs Committee has …
Companies underestimate costs of security breaches
Aveksa announced the findings of a recent survey conducted to examine many different facets of IT security, including:: Concerns about moving sensitive applications and data …
“Amy Winehouse death video” scams hit Facebook users
The past weekend has been rife with bad news that captured the attention of the greater public, and online scammers have wasted no time in taking advantage of it. Facebook …
Malware analysis platform
Norman launched the Norman Malware Analyzer G2 platform, which elivers the benefits of traditional sandbox analysis while also offering new IntelliVM capability which embeds …
Featured news
Resources
Don't miss
- Digital sovereignty becomes a matter of resilience for Europe
- Storm-2603 spotted deploying ransomware on exploited SharePoint servers
- CISO New York 2025 brings together top cybersecurity leaders
- Sonicwall fixes critical flaw in SMA appliances, urges customers to check for compromise (CVE-2025-40599)
- Autoswagger: Open-source tool to expose hidden API authorization flaws