How secure is our personal healthcare information?
Forty-seven percent of IT security professionals believe their personal healthcare information is less secure than it was 12 months ago according to a survey by nCircle. The …
Highly critical vulnerability in Safari for Windows
A vulnerability has been discovered in Apple Safari 4.0.5 for Windows, which can be exploited to compromise a system. The vulnerability is caused due to an error in the …
BackTrack 4 R1 Dev public release
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …
phpnuke.org compromised, serving exploits
PHP-Nuke is a popular Web content management system based on PHP and various databases. Once upon a time it was an open-source platform, but is now commercial software. …
SQLninja 0.2.5 released
SQLninja is a tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote …
Week in review: Money mules, community anti-virus and Facebook bugs and privacy issues
Here’s an overview of some of last week’s most interesting news, articles, interviews and reviews: Mobilizing a community to fight malware The word about …
New Facebook bug adds unauthorized apps to your profile
Just a few days after the bug that let users see their friends’ personal chats, another Facebook bug has been discovered yesterday, and this one was adding applications …
Small ISP wins in court, spammers must pay
Asis Internet Service, a smallish Californian ISP that counts only 4 employees, has 2.6 millions reason to celebrate. The ISP filed a lawsuit against a company named …
Clueless fraudster targets ThinkGeek
Popular online retailer ThinkGeek is – like many other retailers – sometimes targeted by fraudsters. To diagnose potential fraudulent orders, they usually …
Screenshot of YouTube video leads to DoS-capable worm
A screenshot of a YouTube video embedded with a link is the gateway to a malicious site where a worm with DoS capabilities is distributed, TrendLabs reports. The innocent …
Botnets battling for digital real estate
April saw high activity from multiple botnets, namely Gumblar and Sasfis, according to a report by Fortinet. While Gumblar remained in the No. 1 position in Fortinet’s …
Rogue software details: RST Antivirus 2010
RST Antivirus 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …