Safari’s AutoFill reveals personal information
A feature of Apple’s Safari browser can be used by hackers to harvest personal information, says Jeremiah Grossman, founder and CTO of WhiteHat Security, in his recent …
Reporting of security breaches should be included in regular reports
Reports that a leading legal expert has called for the mandatory reporting of all data breaches to the UK Information Commissioner’s Office (ICO) – in order to …
Snort 2.8.6.1 released
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …
New book: “Ubuntu for Non-Geeks, 4th Edition”
Ubuntu has been hailed as the Linux distribution for newbies, but getting it up and running isn’t always a walk in the park. Linux is different—but the same unique …
Get notified of suspicious Facebook access to your account
For all of you who haven’t figured it out already, there is a simple way to make sure that if someone breaks into your Facebook account and misuses it, you know it …
The modern network security landscape
Businesses must change their mindset on security to help ensure that their networks and vital corporate information are protected from evolving security threats, according to …
Privacy worries make the E.U. limit use of citizens’ personal data
The European Union has announced its plan to enforce stricter rules regarding its use of personal data of private citizens. “Citizens should have the right to know what …
1.2 million infected by Eleonore exploits toolkit
AVG’s Web security research team has discovered a network of 1.2 million malware-infected computers controlled by cybercriminals who were using the Eleonore exploit …
Security risk tool for healthcare
Whenever there is a security breach of any size involving protected health information (PHI), the healthcare industry is now required under the HITECH Act to complete an …
Time to end the proliferation of passwords in the cloud
Cloud computing promises to free applications from vendor lock-in and the confines of company walls. Business is on the move with laptops, smart phones, and tablets. Access to …
Finally! A sandbox for Adobe Reader
A little more than a year ago, Adobe announced their Adobe Reader and Acrobat security initiative, which would focus on code hardening, incident response process improvements, …
Stuxnet malware and default SCADA passwords put critical infrastructure at risk
Sophos has issued new guidance and research on a Windows zero-day vulnerability that is already being used to target critical infrastructure systems, and for which exploit …
Featured news
Resources
Don't miss
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security