Debian 6.0 released
After 24 months of constant development, the Debian Project released Debian 6.0 (code name “Squeeze”), a free operating system, coming for the first time in two …
Week in review: Extortion schemes, vulnerability tax and new malware strains
Here’s an overview of some of last week’s most interesting news and articles: Microsoft Windows MHTML XSS vulnerability A vulnerability has been reported in …
Free guide: Top 10 reports for managing vulnerabilities
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires …
250,000 Facebook profiles harvested for setting up dating site
250,000 Facebook users have become the unwitting members of a “dating” site whose authors claim is a “work of art” and not set up to make money, but …
Fast-flux tactics for Facebook scams
Survey scams are a daily occurrence for many Facebook users, and “See who’s stalking you on Facebook” is an often-used proclamation to lure the users to …
Targeted attacks on Abobe Reader files rise
GFI Software revealed continuing high levels of rogue security products circulating during January, and a surge in malware that takes aim at vulnerabilities within Adobe …
Google Chrome update includes security fixes
Google Chrome 9.0.597.84 has been released to the Stable and Beta channels for Windows, Mac, and Linux. Fixes: Low Minor sandbox leak via stat(). High Use-after-free in image …
Cybercriminals target Super Sunday as their biggest game ever
Security experts predict record-breaking numbers of online threats and cyber attacks related to Super Sunday as compared to other holidays or events. According to …
Google offers Pwn2Own contestants $20,000 for Chrome exploit
As during the previous four years, this year’s edition of the CanSecWest conference will welcome security researchers bent on trying to exploit vulnerabilities in …
Fake Facebook Security page sending out phishing messages
Phishers have rolled out a new tactic to target Facebook users – they are misusing the name of legitimate Facebook Security page and sending out warnings about an …
Zeus evolution: Geographical attack locations
Despite having been around for four years, Zeus continues to be a thorn in the side of the IT security industry and its business users, mainly because of its constantly …
500,000 stolen e-mail credentials for Waledac’s comeback
Almost a year ago, the Waledac botnet was crippled by a legal action initiated by Microsoft which resulted in the takedown of 273 Internet domains that were being used as …