Facebook Mobile Privacy Dashboard gets an upgrade
Mobile Facebook users will soon have much more control over they privacy settings – they will be able to see what information they are sharing with which applications …
Fake Facebook toolbar leads to malware
It has become a predictable pattern – every time Facebook introduces some changes, malicious spammers start e-mail campaigns that try to take advantage of the news and …
Trojans dominate the threat landscape
As in recent months, Trojans dominated the threat landscape in November, according to GFI Software. Their data revealed that seven of the top 10 malware threats were …
Run Nmap on Android
Droidmap is an Android application for root users that implements some functions of Nmap in a GUI. This program comes with installer scripts for the installation of the …
Scammers preying on those wanting to adopt
The IC3 received information from law enforcement and complaints filed with the IC3 concerning an adoption scam. The scam is an attempt to collect personal information and …
Learn Cisco networking while playing a game
The Cisco CCENT Mind Share Game is a multimedia PC game that helps users acquire knowledge necessary for success on CCENT and CCNA exams. Featuring more than 75 stages, the …
Nessus in the cloud
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of an …
Win a copy of Ninja Hacking!
We are giving away two copies of “Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques“. Throw traditional pen testing methods out the window …
Internet Explorer 9 promises protection from online tracking
Worried about third-party websites tracking your browsing history? Microsoft has a solution for you. The new version of Internet Explorer, which is due for release in early …
WordPress Comment Rating plugin CSRF vulnerability
A vulnerability has been reported in the Comment Rating plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks, …
WikiLeaks-related spam carries worm
Given the great attention that WikiLeaks’ releases of diplomatic cables is garnering around the world, it was only a matter of time when malware pushers were going to …
QuickTime 7.6.9 fixes security issues
Here is the security content related to QuickTime 7.6.9, available for download here. A local user may have access to sensitive information A filesystem permission issue …
Featured news
Resources
Don't miss
- Windows 10: How to get security updates for free until 2026
- XBOW’s AI reached the top ranks on HackerOne, and now it has $75M to scale up
- Why the SOC needs its “Moneyball” moment
- From posture to prioritization: The shift toward unified runtime platforms
- Why should companies or organizations convert to FIDO security keys?