Analyzing and dissecting Android applications for security defects and vulnerabilities
In March 2011, 58 malicious applications were found in the Android Market. Before Google could remove the applications from the Android Market they were downloaded to around …
Law enforcement supports new U.S. data retention bill
A new proposal for a U.S. federal law that would compel ISPs to retain logs regarding their customers for 18 months is currently being discussed in the House of …
Trend Micro Control Manager file disclosure vulnerability
A vulnerability in Trend Micro Control Manager can be exploited by malicious users to disclose sensitive information, according to Secunia. Input passed via the …
“Traffic ticket” spam email leads to scareware
A malicious email purportedly coming from the New York State Police is currently doing the rounds of inboxes and trying to scare people into opening and running the attached …
Credit card numbers stolen in Kiplinger breach
Kiplinger Washington Editors – the publisher of well-known business and economic publications such as the The Kiplinger Letter and the Kiplinger’s Personal Finance …
SSH client PuTTY 0.61 released
After four long years, here comes a new version of PuTTY, the popular free telnet/SSH client for Windows and Unix platforms. PuTTY 0.61 brings new features, bug fixes, and …
Three jailed for online banking attack
Three men have been jailed for a total of 13.5 years for their part in a sophisticated and concerted attack on the UK and international banking system following an …
Microsoft releases new preview of SQL Server “Denali”
Microsoft released the next public CTP of Microsoft SQL Server “Denali” packed with Business Intelligence (BI) improvements and innovations for relational …
Cisco refreshes Catalyst 6500 Series Switches
Cisco introduced the infusion of multiple innovations into its Catalyst 6500 Series Switches, the most widely deployed network switches on earth. At the heart of the makeover …
Microsoft fixes 22 vulnerabilities
In today’s Patch Tuesday, Microsoft released 4 bulletins addressing vulnerabilities affecting Windows and Office. Amol Sarwate, Vulnerability Labs Manager for Qualys, …
Travelers left 11,000 mobile devices at U.S. airports
Travelers left behind more than 11,000 laptops, tablet PCs, smartphones and USB sticks in airports in the United States during the past year. Credant was able to gather survey …
SquirrelMail multiple vulnerabilities
Multiple vulnerabilities have been reported in SquirrelMail, according to Secunia. These vulnerabilities can be exploited by malicious users to conduct script insertion …
Featured news
Resources
Don't miss
- Digital sovereignty becomes a matter of resilience for Europe
- Storm-2603 spotted deploying ransomware on exploited SharePoint servers
- CISO New York 2025 brings together top cybersecurity leaders
- Sonicwall fixes critical flaw in SMA appliances, urges customers to check for compromise (CVE-2025-40599)
- Autoswagger: Open-source tool to expose hidden API authorization flaws