Malicious .rtf file exploits MS Office flaw
A stack-based buffer overflow vulnerability in Microsoft Office has recently been spotted being exploited in the wild by attackers aiming at getting control of targeted …
MySQL 5.5 released
MySQL 5.5 delivers significant enhancements enabling users to improve the performance and scalability of web applications across multiple operating environments, including …
Voice encryption app for the iPhone
Kryptos is a secure VoIP application for the iPhone. It utilizes 256-bit AES military grade encryption to encrypt voice communications between users, while using 1024-bit RSA …
Metasploit 3.5.1 adds Cisco device exploitation
Metasploit now enables security professionals to exploit Cisco devices, performs passive reconnaissance through traffic analysis, provides more exploits and evaluates an …
Ten tips for smartphone security
With the holiday season in full swing, more people are using their smartphone for tasks such as last minute shopping, accessing bank accounts, connecting with friends or …
Network access control system PacketFence 2.0 released
PacketFence is a free and open source network access control (NAC) system. It can be used to effectively secure networks – from small to very large heterogeneous …
Gawker breach triggers password-changing requests from Yahoo, Twitter
The compromise of Gawker’s database containing some 1.3 million user login credentials and the realization that a lot of users – despite constantly being advised …
Bank of America sues ex-employees for stealing confidential data
Four former employees of the Bank of America stand accused of illegally copying a confidential database belonging to the bank’s U.S. Trust and taking it with them to the …
McDonald’s data breach just the tip of the iceberg
A couple of days ago, the database containing the names, mobile phone numbers, and postal addresses and/or e-mail addresses of McDonald’s customers was discovered to …
FBI put backdoors in OpenBSD IPSEC stack?
Some serious allegations have been raised yesterday as Theo de Raadt, founder and leader of the OpenBSD and OpenSSH projects, has made public a private e-mail he received from …
Insiders are most often responsible for data loss
IT managers see insider threat as the biggest danger when it came to data loss within corporate networks (54 percent), according to a survey by Imperva. Far fewer respondents …
Database breach that could endanger lives
A database breach that could result in more than just identity theft is the result of a compromise of the online database of the Mesa County Sheriff’s Department …
Featured news
Resources
Don't miss
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine
- Stop settling for check-the-box cybersecurity policies
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)