Anti-Phishing Phyllis training game
Wombat Security Technologies announced the release of Anti-Phishing Phyllis, a training game to teach employees and customers how to spot fraudulent emails. In this training …
Security hole in Yelp Instant Personalization
A never-ending string of privacy glitches and bugs has struck Facebook since the implementation of its highly controversial Instant Personalization feature. This latest …
Xplico: Network forensic analysis tool
Xplico is an open source Network Forensic Analysis Tool. Its goal is to extract from an Internet traffic capture the applications data contained. From a pcap file Xplico …
New model for cloud-based security from Verizon Business
Verizon Business unveiled a new global, cloud-based SaaS portfolio that offers enterprises the ability to add security services and avoid purchasing expensive equipment. …
Schedule and modify tasks for Windows servers and workstations
Task Scheduler Pro from Lieberman Software now supports all major platforms in the Windows enterprise including Windows 7, Windows Server 2008 R2, Windows Server 2008 and …
Cloud scale data protection and security
ParaScale Cloud Storage 2.5, a cloud storage platform with features for cloud scale data security, protection and accessibility. The software includes features to efficiently …
Windows 7 Compatibility Checker turns out to be a Trojan
A deceptive “help” message invites recipients to check their PCs’ compatibility with Windows 7 by downloading and running an altered version of the Windows 7 …
Twitter gain-more-followers scam
It seems that many Twitter users are desperate for additional followers, and they are willing to take offered shortcuts to achieve that goal. Enter the bogus …
ATM hacks to be demonstrated at Black Hat USA
A year ago, security researcher Barnaby Jack was banned from presenting at Black Hat USA. The subject of his presentation were ATM vulnerabilities, and the reason why he …
U.S. federal data security vulnerabilities
Data security vulnerabilities that exist within U.S. Federal agencies due to employees’ use of unsecure methods to exchange information, such as FTP – despite the …
How secure is our personal healthcare information?
Forty-seven percent of IT security professionals believe their personal healthcare information is less secure than it was 12 months ago according to a survey by nCircle. The …
Highly critical vulnerability in Safari for Windows
A vulnerability has been discovered in Apple Safari 4.0.5 for Windows, which can be exploited to compromise a system. The vulnerability is caused due to an error in the …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains