Please turn on your JavaScript for this page to function normally.
Twitter compromised, DNS hijacking to blame

A couple of hours ago, Twitter web site appeared to be defaced by someone called “Iranian Cyber Army”. The situation was fixed and as it turned out, hack was a …

Advanced cloud security tools

Sun Microsystems unveiled open source cloud security capabilities and announced support for the latest security guidance from the Cloud Security Alliance. The open source …

New book: “The Executive MBA in Information Security”

Supplying a complete overview of the concepts executives need to know, The Executive MBA in Information Security provides the tools needed to ensure your organization has an …

Wireshark 1.2.5 fixes security vulnerabilities

Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. Wireshark 1.2.5 fixes the following vulnerabilities: …

A closer look at Webroot AntiVirus with Spy Sweeper (Scan Version)

Two of Webroot’s software offerings can be tested through a scan version: Webroot Spy Sweeper or AntiVirus with Spy Sweeper. After you’ve downloaded the file from …

VoIP vulnerability trends

McAfee Labs released a very interesting white paper about VoIP vulnerability trends and targets, and about protocol- and application-level attacks. They first observed an …

Secure cloud computing adoption guidance

The Cloud Security Alliance (CSA) issued the second version of its “Guidance for Critical Areas of Focus in Cloud Computing” whitepaper which outlines key issues …

American Express phishing scam

Emails purportedly coming from American Express are making the rounds of inboxes this month. Panda Labs reports they contain a request for Amex customers to update their …

Rogue software details: VaccineSystem

VaccineSystem is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Top 5 trends that will dominate the security landscape

Lavasoft’s list of security predictions for 2010 anticipates the top threats that Internet users should be aware of this coming year as cyber criminals adapt their …

Monetary and reputation threats

In a recent survey about identity theft, Americans said their number one fear was having bank account, credit card or other personal information stolen from their computers. …

New book: “Cloud Security and Privacy”

Cloud computing has emerged as a popular way for corporations to save money that would otherwise go into their IT infrastructure. However, along with the promise of cloud …

Don't miss

Cybersecurity news