IRISS Conference 2010 call for papers
IRISS will hold its first annual conference on the 18th of November 2010. This all day conference will focus on providing you with an overview of the current cyber threats …
Two Mexican botnets taken down
A week ago, Trend Micro was alerted to a phishing attack that was aimed at Spanish-speaking users and was discovered to be originating from a Mexican botnet. The attack was …
Early life cycle security assessment service
HP announced Comprehensive Applications Threat Analysis, a new security service to help companies reduce vulnerabilities at the onset of the application development life cycle …
Mass SQL injection attack compromises IIS/ASP sites
Thousands of websites and who knows how many visitors were affected by the recently discovered mass SQL injection attack that targeted – among others – The Wall …
Beware when placing online bets during the World Cup
With the World Cup approaching, online players all over the world are preparing to place their bets on the different soccer games. Taking security issues into account and …
iPhone security showcase: SafeWallet – Password Manager
Mobile software producer SBSH this week released a new version of SafeWallet – Password Manager, an application used for storing private information on your iPhone and …
114,000 iPad owners’ emails and account IDs exposed
News that vulnerabilities on the AT&T network allowed a group calling itself Goatse Security to harvest emails and AT&T authentication IDs of 114,000 early-adopters …
Drive-by download attack disguised by Canadian Pharmacy website
Red Condor today issued a warning of a new sophisticated email malware threat that spoofs YouTube and uses a redirect on a compromised website to a common Canadian Pharmacy …
Rogue software details: Protection Center
Protection Center is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
WordPress-based, GoDaddy-hosted websites hacked
WordPress users whose websites are hosted on GoDaddy servers have been targeted by fake AV peddlers – again. According to Sucuri Security, the web hosting …
Google patches 11 vulnerabilities in new Chrome, awards $2000 to researcher
Google Chrome 5.0.375.70 has been released to the Stable channel on Linux, Mac, and Windows, and fixes the following security issues: [15766] Cross-origin keystroke …
Twitter’s new service reveals what’s behind shortened links
Hardly a day passes without Twitter users being targeted by spam runs, phishing emails or malicious links that lead the users to malware-ridden websites. When it comes to …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains