Free iPhone rogue applications on Facebook
Sophos is warning Facebook users about messages currently circulating on the social network claiming that friends have received free iPhones. These messages, which have been …
Finding and managing SSL digital certificates
Digital certificates are now cornerstones to business technology. Located on servers, devices, networks and communication platforms, they represent a necessary security …
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today’s ninja, the hacker? As a penetration tester or security …
Snort 2.9.0 released
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
New encryption offerings from Symantec
Symantec announced the expansion of its encryption solution set with the planned launch of PGP Whole Disk Encryption with support for Intel Anti-Theft Technology, Symantec …
Massive iTunes phishing attack
Apple’s popular iTunes platform has become a major target for hackers looking to steal credit card data from the service’s millions of users. Victims receive a …
Arrests of money mules follow ZeuS gang takedowns
Last week’s arrests and indictments of two gangs (one based in the U.K. and one in the U.S.) that used the ZeuS Trojan to syphon huge amounts of money from private and …
The U.S. leads in malicious URLs
During the first half of 2010, Europe sped through the spam-generating fast-lane, bypassing North and South Americas, and Asia-Pacific to earn the “Top Producer of …
XSS flaws found on three security firms’ websites
A group of white-hat hackers has discovered various XSS vulnerabilities on websites belonging to three well-known security companies, and have reported it to the firms …
Cyber security report reveals Feds’ take on FISMA 2.0
A new study examines Federal CIO and CISO perceptions and usage experiences for CyberScope, the new Federal Information Security Management Act’s (FISMA) online …
QualysGuard integrates with Cyber-Ark’s Privileged Identity Management Suite
Qualys and Cyber-Ark announced QualysGuard integration with Cyber-Ark’s Privileged Identity Management (PIM) Suite. With this integration, customers can store and manage …
CSC acquires Vulnerability Research Labs
CSC has acquired the business of Vulnerability Research Labs (VRL), a privately held cyber threat intelligence firm. The acquisition enables CSC to enhance its cybersecurity …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground