Beware of fake emails from Twitter Support
As evidenced by the tweets on their official Safety account, Twitter is warning their users not to open emails purportedly coming from Twitter Support (support@twitter.com) …
Portable PHP password hashing framework
phpass is a portable public domain password hashing framework for use in PHP applications. It is meant to work with PHP 3 and above, and it has actually been tested with at …
McAfee update cripples thousands of PCs
The misidentification of a legitimate Windows file as a virus and its subsequent deletion was what made Windows XP running computers all over the world enter in a continuous …
Metasploit Express: Easy-to-use penetration testing
Rapid7 introduced Metasploit Express, a comprehensive penetration testing solution built on the open source Metasploit Framework. Metasploit Express is designed specifically …
Zbot acquires file infection feature
A Zbot Trojan variant that has the ability to infect other files has been discovered recently. It searches for .exe files in predefined places and injects into them 512 bytes …
Spying the spy: How to turn Trojans against criminals
“Researchers do vulnerability research on so many various application, why not to do it on this one?” asked himself Andrzej Dereszowski, founder and director of …
TinyIDS: Distributed intrusion detection system
TinyIDS is a distributed Intrusion Detection System (IDS) for Unix systems. It is based on the client/server architecture and has been developed with security in mind. The …
So, you bought a fake AV. What happens next?
A Sunbelt researcher has had the “fortune” of having a relative fall for the scam, which gave him the opportunity to take a peak at the process following the …
Rogue software details: Vistop
Vistop is a rogue security application. In order to remove it, find out what folders and registry entries to look for below. Known system changes: Folders …
Facebook profound privacy concerns
Facebook founder Mark Zuckerberg may believe that “the age of privacy is over,” but users of world’s most popular social networking site are actively …
Passive Vulnerability Scanner 3.2 released
Tenable Network Security released version 3.2 of the Passive Vulnerability Scanner (PVS), a passive technology that monitors network traffic and provides real-time …
Escalation of pharma spam from Gmail accounts
A recent noticeable upsurge of spam massages coming from compromised Gmail accounts has led the unfortunate victims to speculate that there is a bug in the Gmail mobile …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!