Conversation-spying Android Trojan in the wild
Android malware has so far been spotted doing things like sending text messages or making calls to premium service numbers, sending out information about the device and …
Arrested “Topiary” has a name, faces five charges
The alleged LulzSec member arrested last week by the e-Crime Unit of London’s Metropolitan Police on the Shetland Islands has a name: Jake Davis. He is 18 years old …
Facebook introduces bug bounty program
Facebook has decided to follow in Google’s and Mozilla’s steps and institute a bug bounty program rewarding the responsible disclosure of security vulnerabilities …
Week in review: Massive iFrame injection attack, Anonymous/LulzSec arrests and Facebook phishing
Here’s an overview of some of last week’s most interesting news and articles: Global analysis of 10 million web attacks Web applications, on average, experience …
Conficker found on external HD devices on sale
Australian supermarket chain ALDI might seem like the last place where one can pick up a Conficker infection, but according to an emergency security alert by the Australian …
“Wrong hotel transaction” spam bombards victims with malware
A particularly malicious spam run consisting of emails ostensibly sent by reception desk managers of various hotels has been targeting Visa users. The emails exhibit subject …
Web app security scanner Netsparker 2.0 released
Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …
Norman antimalware appliance built on Linux platform
Norman announced the latest version of its Network Protection (NNP) antimalware appliance, which improves protection against persistent IT infrastructure security attacks. New …
IT control objectives for cloud computing
Cloud computing has become a major growth area in IT spending, and enterprises must adapt to the changes it brings to maximize the return on investment. To help organizations …
BT commanded to block site linking to pirated content
The verdict is in: British Telecom must block users from accessing the Newzbin 2 website, an aggregator of links to pirated movies and other content. The ruling could provide …
Use Google’s indexing capabilities to identify vulnerabilities
Next week at Black Hat, Stach & Liu researchers Francis Brown and Rob Ragan will show how the power of Google’s indexing capabilities can be harnessed to identify …
What did the RSA breach end up costing EMC?
RSA, the security division of EMC Corporation, has suffered a breach of its networks and the loss of critical data back in March. An initial refusal of sharing details of the …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains