Lady Gaga, Justin Timberlake targeted by German hackers
Two German youths have allegedly been using Trojans to hack into computer belonging to over 50 pop stars, looking primarily for unreleased music but also for personal …
WikiLeaks back online on new Swiss domain
The cat and mouse game continues for WikiLeaks as it moves its site to Switzerland – wikileaks.ch is the new domain on which the whistleblowing site can be reached. The …
Twitter accounts spreading malicious code
Cybercriminals are exploiting Twitter to spread malware using festive-themed messages, according to PandaLabs. Using methods akin to black hat SEO techniques, hackers are …
WikiLeaks site is down
Whether its really because the DDoS attacks against the WikiLeaks website have threatened “the stability of the EveryDNS.net infrastructure, which enables access to …
IBM improves software security analysis
IBM announced new software and analysis capabilities that provide a more efficient and accurate way to design and manage secure applications. By consolidating software …
Adobe update scam offers “membership”
E-mails purportedly coming from the Adobe Support Team, reminding the recipient that a new version of Adobe Acrobat Reader has been released and offering a link …
New book: Managed Code Rootkits
Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when …
New e-mail security service from Barracuda
Barracuda Networks launched their new Email Security Service, a cloud-based e-mail filtering service which offers: Dual protection points – Onsite and cloud-based threat …
GFI MailSecurity 2011 released
GFI Software launched a new version of its multiple antivirus email security software, GFI MailSecurity which boosts malware detection using sandbox technology and, for …
WikiLeaks booted from Amazon, Assange to be arrested soon
While a “hacktivist” that goes by the handle of The Jester has claimed responsibility for the DDoS attack aimed at the WikiLeaks’ page via his Twitter …
The golden hour of phishing attacks
Trusteer conducted research into the attack potency and time-to-infection of email phishing attacks. One of their findings was that 50 per cent of phishing victims’ …
ProFTPD.org main FTP server compromised
A warning has been issued by the developers of ProFTPD, the popular FTP server software, about a compromise of the main distribution server of the software project that …
Featured news
Resources
Don't miss
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine
- Stop settling for check-the-box cybersecurity policies
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)