Critical vulnerability in Adobe Flash Player
A critical vulnerability exists in Adobe Flash Player 10.2.152.33 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems (Adobe Flash Player …
Medical identity theft: The growing cost of indifference
While consumers grasp the importance of protecting their medical and personal information, few individuals take the necessary precautions to avoid medical identity theft, …
Internet Explorer 9 delivers improved security
Microsoft released Internet Explorer 9 today. This release improves security, privacy and reliability. Tracking protection. Some content on websites can be used to track your …
Anonymous leaks incriminating Bank of America e-mails
The big news today is that Anonymous – the hacktivist group known for its DDoS attacks and support for WikiLeaks – has rendered public a collection of e-mails it …
Highly targeted attacks exploiting Windows MHTML vulnerability
A recent surge in attacks against a variety of sites that exploit a MHTML XSS vulnerability publicly disclosed in January – and which still hasn’t been patched by …
40th anniversary of the computer virus
This year marks the 40th anniversary of Creeper, the world’s first computer virus. From Creeper to Stuxnet, the last four decades saw the number of malware instances …
HoneyPoint Wasp: Monitor the security of Windows environments
MicroSolved announced a new version of HoneyPoint Wasp 1.50 which gives more capability to the security team to easily gain visibility into Windows systems and more power to …
Anti-phishing tool detects fraudulent sites by analyzing their elements
A Hong Kong City University professor that concentrates his effort on ways for combating phishing has recently made public a piece of software that proactively detects …
“Japanese Tsunami RAW Tidal Wave Footage” scam on Facebook
As the Japanese tragedy unfolds, so do the various online scams taking advantage of people’s interest in the situation. We have already witnessed black hat SEO poisoning …
Week in review: Poisoned Japan earthquake search results, open source exploit kit and new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: The importance of metadata to prevent data leaks A new IDC report highlights how the …
Pwn2Own: iPhone and Blackberry hacked
On the second day of the Pwn2Own contest held at the CanSecWest conference, iPhone and Blackberry devices have been successfully exploited, while the scheduled Android and …
Spoofed reported attack pages lead to ransomware
Spoofed reported attack pages have been the lure of choice of fake AV and ransomware peddlers for quite some time now, so it shouldn’t come as a surprise that a recent …
Featured news
Resources
Don't miss
- Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025-54309)
- How to land your first job in cybersecurity
- World Health Organization CISO on securing global health emergencies
- Calico: Open-source solution for Kubernetes networking, security, and observability
- Cyber turbulence ahead as airlines strap in for a security crisis