15 vulnerabilities patched in Adobe Reader and Acrobat
Critical vulnerabilities have been identified in Adobe Reader 9.3.1 (and earlier versions) for Windows, Macintosh, and UNIX, Adobe Acrobat 9.3.1 (and earlier versions) for …
The lazy programmer’s guide to secure computing
This presentation starts with a simple block of code written by the Lazy Programmer, to observe how laziness made the code more compact and simpler. We then define the …
Apache.org hit by XSS, bruteforce attack
The Apache Software Foundation is the latest victim of a targeted attack aimed at its infrastructure – more specifically, at the SliceHost server (brutus.apache.org) …
Google’s priorities: Security and mobility
The future of computing is mobile. This statement has been repeated time and again by many people in the computer industry, and yesterday was Eric Schmidt’s turn to say …
10 online safety tips
Parents and teachers should avoid overlooking the dangers associated with the Web and the risks they pose to children. Kids today are fascinated by the Internet and extremely …
Medical records secured by code-changing algorithm
Medical records databases are a treasure trove for researchers – mapping trends in diseases and studying them to discover better treatment methods has never been easier. …
New Data Loss Prevention solution from CheckPoint
Check Point announced its new network-based Data Loss Prevention (DLP) solution that helps businesses move data loss from detection to prevention by pre-emptively protecting …
Future air travel security risks, privacy and social implications
The European Network and Information Security Agency (ENISA) has analyzed the risks associated with a future air travel scenario, enabled with “Internet of …
President’s death used for fake AV peddling
Scammers are taking advantage of the people’s interest in the news of the tragic death of Poland’s President Lech Kaczynski to peddle their fake AV software. By …
Farm Town players targeted by malvertisements?
Players of the popular Facebook game application Farm Town are warned not to fall for the fake security warnings claiming that the user is infected by a virus that pop up …
Endpoint data leak prevention still a major headache
More than one in three (38%) of respondents are still failing to deploy any form of data leak prevention, whether that be device control, endpoint DLP or DLP appliances. …
Cash extortion scheme targets BitTorrent users
BitTorrent users are targeted by an unprecedented extortion campaign that threatens them with legal action for copyright infringement, unless the pay a $400 …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!