Pharma spam on forums near you
Forever searching for new ways to accost naive shoppers, fake and/or illegal on-line pharmacy sites have lately taken to forcing their ads on unsuspecting forum visitors. …
Declining confidence in social networking security
Consumer awareness of phishing attacks has doubled between 2007 and 2009 and the number of consumers who reported falling prey to this attack increased six times during that …
Rogue software details: Windows Security Suite
Windows Security Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Folders …
Encryption challenge worth $100K
News that am encrypted swiss army knife from manufacturers Victorinox remained uncracked – and a $100,000 prize went unclaimed – at the Consumer Electronics Show …
SASFIS Trojan treads lightly
The SASFIS Trojan variants may be not as famous and well-known as BREDOLAB’s or Zeus/Zbot’s, but they still pose a considerable danger to users and networks around …
Nmap 5.20 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap 5.20 offers more than 150 significant improvements: 30+ new Nmap Scripting Engine …
Analysis of 32 million breached passwords
Imperva released a study analyzing 32 million passwords exposed in the Rockyou.com breach. The data provides a unique glimpse into the way that users select passwords and an …
Mac OS X Snow Leopard common criteria certification
Atsec information security announced the successful common criteria certification of Mac OS X Snow Leopard at EAL 3 (augmented for flaw remediation) with the Controlled Access …
Fear of stealth hackers
One of the biggest fears that software companies have is that someday hackers will manage to steal the source code of their products and modify it so that they can secretly …
Critical Shockwave Player vulnerabilities patched
Critical vulnerabilities have been identified in Adobe Shockwave Player 11.5.2.602 and earlier versions, on the Windows and Macintosh operating systems. The vulnerabilities …
Hiding from Google
Worried about Google tracking your online activity? Not satisfied with Tor’s speed? A (partial) solution to your problem has been set up by Moxie Marlinspike, a hacker …
Networks Solutions breached, hundreds of sites defaced
Network Solutions, the well-known U.S. hosting provider and domain registrar that manages over 6.6 million domain names, confirmed on Tuesday that their servers have been …
Featured news
Sponsored
Don't miss
- How a GRC consultant passed the CISSP exam in six weeks
- BLint: Open-source tool to check the security properties of your executables
- Tailoring responsible AI: Defining ethical guidelines for industry-specific use
- Are you meeting your cyber insurance requirements?
- Black Basta target orgs with new social engineering campaign