140,000 children could be identity fraud victims
For most people, the thought of their children being victims of identity fraud is even more chilling than being a victim themselves. While children are less at risk for …
Critical vulnerability in Sun Java
ACROS Security has discovered a vulnerability in Sun Java, which can be exploited by malicious people to compromise a user’s system, according to Secunia. The …
MS Security Center search results poisoned
You would think that the Microsoft Safety and Security Center is the one place where you would be safe from malicious links, and you would be wrong. According to GFI’s …
U.S. to consider a new, secure Internet
While Iran thinks about instituting a national Internet in order to minimize the “poisoning” of Iranian minds with Western ideas and culture, the U.S. is toying …
An examination of malware ecosystems
Malware delivery networks are typically hosted across multiple sites and are responsible for launching dynamic attacks on unsuspecting users. A new Blue Coat report examines …
U.S. government-funded labs targeted by cyber attacks
It’s safe to say that successful U.S. companies, government facilities and military contractors are by now to aware that they should always be on the lookout for cyber …
Can the Google .co.cc ban be effective?
Google has recently decided to block all pages hosted on the .co.cc domain from appearing in its search results, and the move has sparked discussions. The search giant has …
“Casey Anthony confession video” scam spreads
The verdict in the high-profile Casey Anthony case has ultimately disappointed a lot of people who believe that she did kill her two-year-old daughter, and scammers have …
Law enforcement winning the battle against cybercrime
June was a difficult time for cybercriminals as it saw some notable successes for various law enforcement agencies in the war on cybercrime, according to Kaspersky Lab’s …
New voice identification technology
Neurotechnology introduced VeriSpeak, a new voice identification technology, available in the VeriSpeak SDK and as a new voice identification. VeriSpeak combines voiceprint …
CentOS 6.0 released
CentOS 6.0 for i386 and x86_64 architectures is now available. It is based on the upstream release EL 6.0 and includes packages from all variants. All upstream repositories …
Metasploit: The Penetration Tester’s Guide
The free and open source Metasploit Framework is the most popular suite of penetration testing tools in the world, with more than one million downloads yearly. Metasploit: The …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous