Stolen flash drive with sensitive financial info
Another example that demonstrates the need to follow security policy when it comes to keeping personal and financial information handled by businesses and organizations secure …
Android game hides spying application
If you have a game called Tap Snake on your Android handset and you weren’t the one who installed it, you are probably getting spied on by someone who had physical …
Secure remote access for Mac users
HOB launched MacGate, a new secure remote access solution designed specifically for Mac users. It provides users with access to computers running Mac, especially graphics …
7-character passwords soon to be hopelessly inadequate
The increasing processing power and the growing number of processors on graphic cards will soon make 7-character passwords “hopelessly inadequate” to withstand …
HP to acquire Fortify Software
HP and Fortify Software have entered into a definitive agreement under which HP will acquire Fortify Software. Terms of the deal were not disclosed. With the acquisition of …
Publicly trusted secure e-mail certificates
Entrust adds publicly trusted secure e-mail certificates to its certificate management service, enabling digital signature capabilities and encryption of e-mails and other …
ClamAV for Windows 2.0 released
ClamAV for Windows 2.0 is designed to provide the ClamAV community with a Windows AV solution incorporating all the standard desktop AV features one would expect from any …
Courier service customers targeted by phishing web sites
Customers of well-known courier services are often targeted by cybercriminals. Sometimes they try to make them open malicious files attached in emails with the excuse of …
Deconstructing ColdFusion
In this video from OWASP AppSec Research 2010, Chris Eng from Veracode provides a practical guide for those doing penetration testing or code reviews on an application written …
BitDefender Total Security 2011 released
BitDefender announced the launch of Total Security 2011, which offers protection against viruses, spyware, phishing and identity theft attacks. It includes antivirus, firewall …
5 million domains serving malware via compromised Network Solutions widget
A recent rise in the number of Armorize’s customers’ sites getting flagged by their own drive-by downloads and zero-day malware threats detection service HackAlert …
Fake dislike button Facebook scam
Facebook users should be wary of the latest survey scam spreading virally across the network. There are a number of variations of this scam, which sees users unwillingly …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous