Mac Protector: Fake AV targets Mac OS X users
A little over two weeks have passed since the appearance of MAC Defender, the fake AV solution targeting Mac users. And seeing that the approach had considerable success, it …
Insider threats plague data managers
Financial services organizations struggle with human error, abuse of privileges more than most. Application Security, Unisphere Research, and the International Sybase Users …
Microsoft Web Application Configuration Analyzer 2.0 released
Web Application Configuration Analyzer (WACA) is a tool that scans a server against a set of best practices recommended for pre-production and production servers. The list of …
A guideline for critical information infrastructure governance
ENISA launched a new publication on National Risk Management (NRM) preparedness. The report sets out the essential elements as a guideline for the governance of NRM in …
Stolen credit card numbers advertised via Twitter
You would expect online criminals to want to keep a low profile and restrict their attempts of selling stolen wares to shady online criminal forums, but every once in a while …
SpyEye Trojan attacks Verizon’s online payment page
Trusteer discovered a configuration of the SpyEye Trojan targeting Verizon’s online payment page and attempting to steal payment card information. The attack took place …
Journalist arrested for article on Facebook privacy flaw
Australian journalist Ben Grubb was arrested yesterday following the publication of an article he wrote about a demonstration of how to access Facebook photos even if they are …
Worrying trend in credit card data security
A new BitDefender study which has revealed some concerning statistics on the personal protection of credit card data. 97% of 2,210 respondents aged 18 to 65 said they …
Facebook scam uses fake YouTube CAPTCHAs
It seems sometimes that Facebook survey scams alternate between just to types of lures: “See you views your profile” and “OMG! I can’t believe …
HADOPI stops monitoring for copyright infringement due to breach
Trident Media Guard – the company tasked by the French High Authority for the Dissemination of Works and Protection of Rights on the Internet to monitor P2P networks and …
New vulnerability reporting framework
The Industry Consortium for Advancement of Security on the Internet (ICASI) published of its Common Vulnerability Reporting Framework (CVRF) Version 1.0. CVRF is an XML-based …
Microsoft Forefront Endpoint Protection 2012 Beta released
Microsoft released Forefront Endpoint Protection 2012 Beta which continues to provide proactive protection against known and unknown threats using multiple technologies in the …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month