Twitter PDF exploit spam
As evidenced by these real-time results, various Twitter accounts have recently bombarded other users with a message saying “Wow, A marvelous Product” and …
Maltego 3 released
Maltego is a platform developed to deliver a clear threat picture to the environment that an organization owns and operates. Maltego’s advantage is to demonstrate the …
Facebook not doing enough to prevent clickjacking attacks
With clickjacking worms becoming an increasing problem on Facebook, a study by IT security and data protection firm Sophos has revealed that 95% of those polled do not believe …
Remote working poses threat to corporate security
A recent survey of 200 UK IT directors has found that 92 percent believe that, by allowing more staff to work remotely, they are increasing their security risks. Even though …
Lines between personal and company data becoming blurred
Failure by SMBs to adopt formal corporate social media policies, as highlighted by a survey by SpamTitan, could be storing up legal trouble for themselves in the not too …
Free AVG LinkScanner for Mac
AVG Technologies unveiled the free AVG LinkScanner for Mac, designed for Mac OS X Leopard or Snow Leopard and supports internet browsers Safari 3.x, Safari 4.x, Safari 5x and …
iPhone app for two-factor authentication
Swivel Secure announced the immediate availability of the Swivel iPhone App further adding to the range of token-less user interface options available to users of their …
Degauss your photocopier hard drives and prevent data theft
The vulnerability of information stored on a computer hard drive has been recognized as a security risk for some time, but did you know that digital photocopiers and high-end …
Internet-optimized x86-server from SeaMicro
SeaMicro emerged from stealth mode to launch the SM10000, an Internet-optimized x86-server that reduces by 75 percent the power and space used by servers. In development for …
Facebook “101 hottest women” clickjacking attack
Another clickjacking attack taking advantage of the “Like” button option has targeted Facebook users. The lure is very simple – follow the link to see the …
Automated social engineering PoC successful on Facebook and IRC
When it comes to social engineering attacks, one of the main challenges for the attackers is how to maximize the number of targets and the number of victims. In order to reach …
Backdoor in open source Linux IRC server
The public can be forgiven for thinking that Linux-based operating systems are somehow immune to attacks and compromises, since news of such an occurrence pops up …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse