Operation Payback picks up speed, WikiLeaks denies involvement
The WikiLeaks saga continues. As Julian Assange spends his time in the segregation unit of Wandsworth prison, hoping that his lawyers will be able to reverse the court’s …
Underground toolkits will make cyber espionage easy
With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …
Advanced iPhone spy application
Mobistealth launched an advanced iPhone spy application which can be installed on any iPhone and runs completely in the background. The application is virtually undetectable …
Firefox 3.6.13 fixes many security issues
Mozilla released Firefox 3.6.13 that fixes several security issues. Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) Mozilla developers identified and fixed several …
Deploy and remotely execute programs on Windows networks
RemoteExec for Windows is an agentless, encrypted software solution that allows IT pros to: Quickly and easily deploy MSI packages, Service Packs, patches, hotfixes, etc. …
New book: Troubleshooting Windows 7 Inside Out
You’re beyond the basics, so dive right into troubleshooting Windows 7 and really put your PC to work! Troubleshooting Windows 7 Inside Out describes hundreds of …
Increased illicit behavior on Internet pharmacies
Of the nearly 7,000 sites reviewed by the National Association of Boards of Pharmacy, only 4% of those online sites appear to be in compliance with pharmacy laws and practice …
Polyglot worm spreads via IM
A curious little worm has been spotted spreading via various IM applications – Skype, ICQ, MSN Messenger, Google Talk, and others. What is curious about it is that it …
Anonymous continues with DDoS attacks, possibly using a non-volunteer botnet
Anonymous – the hacktivist group that has become notorious for its DDoS attacks on websites of the RIAA, MPAA, and other anti-piracy organizations and companies – …
Facebook Mobile Privacy Dashboard gets an upgrade
Mobile Facebook users will soon have much more control over they privacy settings – they will be able to see what information they are sharing with which applications …
Fake Facebook toolbar leads to malware
It has become a predictable pattern – every time Facebook introduces some changes, malicious spammers start e-mail campaigns that try to take advantage of the news and …
Trojans dominate the threat landscape
As in recent months, Trojans dominated the threat landscape in November, according to GFI Software. Their data revealed that seven of the top 10 malware threats were …
Featured news
Resources
Don't miss
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount