iTunes/PayPal scam is due to phishing, not a bug?
A recent flurry of iTunes customers’ reports that their accounts must have been hacked and used to execute purchases via PayPal that occasionally total up to thousands …
Top 10 best practices for payment application companies
Visa announced global industry best practices for payment application vendors, integrators and resellers that implement, install or manage payment-related systems on behalf of …
U.S. visitors easy prey for online scammers
As you may already know, travelers from the 36 countries that don’t require a visa to enter the U.S. must still register online for travel authorization. And as of …
Adobe closes critical vulnerabilities in Shockwave Player
Critical vulnerabilities have been identified in Adobe Shockwave Player 11.5.7.609 and earlier versions on the Windows and Macintosh operating systems. The vulnerabilities …
The dramatic increase of vulnerability disclosures
Vulnerability disclosures are increasing dramatically, having reached record levels for the first half of 2010, according to the IBM X-Force 2010 Mid-Year Trend and Risk …
Nearly 3 million undetected “Hot Video” pages pushing fake AV
We’ve seen many fake YouTube pages redirecting to fake antivirus software downloads in the past. However, we’re now seeing this same phenomenon with a new twist: …
Increasing security on mobile applications will extend adoption
Many of today’s mobile applications have limited functionality from a lack of overall security, according to a study by Entrust. And for mobile applications that feature …
Apple patches vulnerabilities with new update
Apple released Security Update 2010-005 which increases the stability, compatibility, and security of your Mac. ATS A stack buffer overlow exists in Apple Type Services’ …
Novell releases Cloud Security Service
Novell announced the general availability of their Cloud Security Service which gives cloud providers the ability to deliver secure access and compliance in the cloud for …
Vulnerability research market grows
It is becoming increasingly evident that research on network security is crucial for the protection of critical telecommunications and computing systems. This is especially …
Video: Microsoft DLL hijacking exploit
This is a short video demo of the Microsoft DLL Hijacking Exploit on Windows 7 and office 2007.
Microsoft releases mitigating tool for latest 0-day bug
HD Moore, CSO at Rapid7 and creator of Metasploit, revealed last week that some 40 Windows applications are affected by a critical vulnerability that can allow attackers to …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous