Broadcom releases 40nm Wi-Fi and Bluetooth combo chip
Broadcom released the BCM43142 InConcert combo chip which combines Wi-Fi Direct connectivity with seamless proximity-based pairing, simplifying wireless connectivity in the …
Phishing forms on Google Docs
Google Docs is a handy online service for creating various types of documents that are hosted by the company in their cloud and can be made accessible to the greater public. …
Web Application Attack and Audit Framework 1.0 released
The Web Application Attack and Audit Framework’s (w3af) goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. …
PBS website hit by hacktivists, its database leaked online
The hacktivist group behind the Fox breach seems to have made good on its promise to “own more things next week” – they have targeted the PBS website during …
Backdoor instructions for Allied Telesis switches leaked
A simple categorizing mistake has resulted in the publishing of an internal Allied Telesis document that reveals how to set up backdoor accounts for the company’s …
Attack against Lockheed Martin result of previous RSA breach?
Lockheed Martin, one of United States’ largest military contractors, has experienced an attack against its computer networks, and speculations abound on whether the …
Fake YouTube notifications doing rounds
YouTube users are targeted with notifications supposedly sent by YouTube administrators and containing links to Canadian pharmacy sites, warns BitDefender. With “YouTube …
Week in review: LinkedIn, Hotmail security flaws, Chrome apps with dangerous permissions and the evolution of Mac fake AV
Here’s an overview of some of last week’s most interesting news: 1.5 billion smart credentials to ship The increasing use of smart cards and biometric capture has …
Apps with dangerous permissions pulled from Chrome Web Store
Do you trust Google to review and ban potentially malicious applications from its online stores? The Android Market has already been found offering “trojanized” …
Code in the Cloud: Programming Google AppEngine
Cloud applications are the next big shift in application development: instead of building single-user applications to run on a personal computer, new applications are being …
Cloud identity tools for LinkedIn, Twitter and Microsoft Live
Ping Identity released Cloud Identity Connectors for LinkedIn, Twitter, and Microsoft Live, enabling the enterprise to rely on cloud service providers and social networking …
SCADA SIEM for critical infrastructure protection
AlienVault released its ICS SIEM, a family of purpose-built appliances which provide a platform for security and compliance management across industrial process control …