1,800 Office bugs discovered by Microsoft’s “fuzzing botnet”
Distributed Fuzzing Framework is what they call it at Microsoft, and it’s the realization of an idea that originated with one of the software designer engineers of its …
Stalker jailed for planting child porn on a computer
An elaborate scheme to get the husband of a co-worker he was obsessed with locked up in jail, backfired on Ilkka Karttunen, a 48-year from Essex. His plan was to get the …
Games on social networks increase spam and phishing by 50%
In order to reach high scores, social entertainment applications require users to gather a considerable number of friends and supporters to play the same game, leading to …
Wireshark 1.2.7 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following bugs have been fixed: SNMPv3 Engine ID …
Evolving malware attack strategies exploit online user behavior
The popularity of social networking services and changes in online user behavior are driving broader attack strategies, including complex blended threats, faster malware …
Rogue software details: BraveSentry
BraveSentry is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Swiss privacy: Myth or reality?
How is privacy impacting Swiss banks? It’s time for a change according to Dr. David Costa, Professor at Robert Kennedy College who comments on Bloomberg TV.
Hacked Yahoo email accounts in China and Taiwan
Yahoo email accounts of several journalists and human activists have been hacked and their contents likely downloaded in what seems like an organized attack concentrated on …
QuickTime 7.6.6 fixes security issues
Here is the security content related to QuickTime 7.6.6, available for download here. Playing maliciously crafted audio content may lead to an unexpected application …
Breached companies are not entitled to anonymity
Does the recent decision by District Judge Douglas Woodlock – to unseal the identities of two companies (J.C. Penney and Wet Seal) whose customer data has been stolen by …
New Linksys wireless routers
Cisco unveiled a new line of Linksys wireless routers, designed to let its core audience of tech experts and enthusiasts take their home networking experience to the next …
Blackhat SEO techniques
The business of using blackhat Search Engine Optimization (SEO) techniques to impregnate legitimate sites has become a huge money-spinner for cybercriminals. Every day scores …
Featured news
Resources
Don't miss
- Why AI code assistants need a security reality check
- GPS tracker detection made easy with off-the-shelf hardware
- 91% noise: A look at what’s wrong with traditional SAST tools
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)