Latest IE 0-day exploit finds its way into Eleonore toolkit
Microsoft will likely be forced to issue an out-of-band-patch for the zero-day vulnerability affecting Internet Explorer that has been discovered being exploited in the wild …
Toy robots can guard your home
Worried about burglars ransacking your house? Buy yourself some toy robots! It is what Robert Oschler, a Florida-based programmer, did. He bought a Rovio – a Wi-Fi …
Microsoft Kinect may be eavesdropping on you
Released only five days ago, Microsoft’s Kinect seems poised to start a revolution in gaming. And if you are one of the lucky people who already managed to get their …
G20 summit related malicious spam campaign
Spammers are taking advantage of the oddest things. The lately detected spam messages concerning the upcoming G-20 summit in Korea is an example of such a specifically …
Data breaches cost hospitals billions
Data breaches of patient information cost healthcare organizations nearly $6 billion annually, and that many breaches go undetected, according to a study by the Ponemon …
Employees will take bigger risks during this holiday season
Employees in the US plan to spend less time shopping online from a work-supplied computer this holiday season than they did a year ago, but more of them are engaging in risky …
Classification of web applications and content by URL category
Blue Coat Systems announced that their PacketShaper appliances can now deliver instant awareness of Web applications and content. The appliances provide intelligent control …
Microsoft offers Security Essentials via Windows Update, Trend Micro objects
Trend Micro is crying foul over the latest Microsoft move that sees its U.S. customers being offered to install the company’s free Security Essentials solution through …
Royal Navy site hack forces MoD to suspend website
A Romanian hacker known as ‘TinKode’ has claimed to have broken into the main British Royal Navy website, www.royalnavy.mod.uk, and posted sensitive information …
Mismanaged data encryption causes financial loss
Venafi invited the 150-plus survey participants from the world’s largest companies to give their views on the problem of downtime caused by increasing encryption …
Extract and analyze digital evidence from Mac OS X systems
ATC-NY released Mac Marshal 2.0 which automates the forensics process for a cyber investigator. It scans a Macintosh disk, automatically detects and displays Macintosh and …
Wikileaks soon to be joined by new whistleblower site?
The Wikileaks saga continues. After having been denied a Swedish residence and work permit, Julian Assange is considering asking for asylum in Switzerland – and moving …
Featured news
Resources
Don't miss
- Trojanized SonicWall NetExtender app exfiltrates VPN credentials
- High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218)
- Why work-life balance in cybersecurity must start with executive support
- Reconmap: Open-source vulnerability assessment, pentesting management platform
- Microsoft will start removing legacy drivers from Windows Update