Multiple vulnerabilities in Cisco Wireless LAN Controllers
Cisco WLCs and Cisco WiSMs are responsible for system-wide wireless LAN functions, such as security policies, intrusion prevention, RF management, quality of service, and …
Scammers target aspiring games beta testers
Scammers purportedly looking for beta testers for computer games have lately stepped up their efforts, says Sunbelt‘s Christopher Boyd. He has observed two distinct …
How your identity could be stolen on Facebook
With its millions of users, the world’s most popular social network has become a perfect target for attackers exploiting such a dense concentration of potential victims. …
Tips for safer social networking
The popularity of social networking sites such as Facebook, Twitter and LinkedIn is continuing to grow dramatically, but not just with users. Cybercriminals increasingly are …
Android SMS Trojan delivered via SEO techniques
Android users searching for pornography on their smart phones could be in for a costly surprise. During the course of researching the origin for the first SMS Trojan for …
Apple iOS 4.1 fixes security issues
The iOS 4.1 Software Update is the first major update to iOS 4, bringing Game Center, new iTunes features, high dynamic range photography, and security updates to the iPhone. …
Security for Android applications
Arxan Technologies released EnsureIT for Android, a software protection product that secures mobile Android applications against reverse-engineering or tampering for …
Infiltrated SpyEye C&C server provides glimpse into botnet activity
A C&C server controlling a small botnet comprised of computers infected by SpyEye – the information/data stealer Trojan often called “ZeuS Killer” on …
Gmail phishing campaign is under way
Fake notices inviting Gmail users to update their Google account information have lately been hitting inboxes around the world, warns Sunbelt. Purportedly coming from the …
Trend Micro launches Titanium 2011 security software
Trend Micro released Titanium Security 2011 that utilizes a cloud-client strategy that combines cloud-based web, email, and file reputation services with Trend Micro’s …
NSA Director says citizens’ privacy will never be compromised
Cybersecurity and citizens’ privacy won’t be mutually exclusive terms for the federal government, vows NSA Director Gen. Keith Alexander. “As the director of …
International variations in online threat perception
How do computer users around the world view online security risks? A survey by F-Secure reveals some interesting international variations in people’s experiences and …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down