Proof-of-concept Android app reveals platform’s security bug
Angry Birds is an extremely popular mobile game that can be played on Apple, Android and Nokia mobile devices – indeed, it has been downloaded by millions of users. So, …
Half of SMBs block employee access to Facebook
Companies are becoming more vigilant when it comes to their employees’ use of social networking sites, according to Webroot. The survey of more than 1,000 businesses …
40% of all rogueware was created in 2010
PandaLabs warned that 40% of all fake antiviruses ever have been created this year. That is, ever since this type of malicious code was first reported four years ago, …
Vulnerability assessment for Microsoft SQL Azure
Sentrigo announced Repscan 4.0 which offers expanded support for cloud-based and open source database platforms, productivity enhancements for database administrators (DBAs) …
VLC 1.1.5 fixes Windows vulnerability
The VLC development team introduced VLC 1.1.5, the sixth release of the 1.1.x branch of VLC. This release focuses on minor features, bugfixes and security issues: …
Will ears replace fingerprints as a form of ID?
Fingerprint checks and iris scans may be the most popular ways of biometric identification for the time being, but it looks like they might soon be joined – if not …
Security preparations for IPv6 migration must start now
The arrival of a slew of new and upgraded operating systems, smartphones and tablets that are enabled for IPv6 has the potential to open new and unrecognized security …
Top 10 security threats for 2011
Imperva announced their predictions for the top ten security trends for 2011 which have been compiled to help IT security professionals defend their organization against the …
Lethic Trojan is back, uses same stolen digital certificate as Stuxnet
Some two months ago, the world found out about the Stuxnet – the worm that used the Windows .lnk file vulnerability in order to spread through removable drives of …
Week in review: Firesheep countermeasure tool, Facebook bug and Barracuda bug bounty program
Here’s an overview of some of last week’s most interesting news, articles and reviews: Firesheep countermeasure tool BlackSheep Zscaler researchers have created, …
Palin e-mail hacker sentenced
After a number of delays, former University of Tennessee student David Kernel has finally received his sentence for compromising Sarah Palin’s Yahoo! e-mail account back …
Millions stolen in ATM fraud
Two executives of an automated teller machine dispensing company are currently waiting to be sentenced in a case of fraud perpetrated against Connecticut’s Domestic …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous