Distributed test lab monitoring and network troubleshooting
Codenomicon launched a Network Analyzer that records test behavior and automatically visualizes network traffic. It provides testers with a clear picture of actual network …
Office photocopiers brimming with corporate secrets
Most people fail to realize that modern, multi-purpose photocopiers contain hard drives that – if not erased when decommissioned – could prove to be a treasure …
Phishing Indian employers and job seekers
People seeking jobs online have been targeted a number of times since the advent of the economic recession, but in India even the potential employers become targets. Symantec …
90% of critical Windows 7 vulnerabilities are mitigated by eliminating admin rights
The removal of administrator rights from Windows users is a mitigating factor for 90% of critical Windows 7 vulnerabilities, according to research by BeyondTrust. The results …
Week in review: Mafia-like cyber crime syndicates, Pwn2Own contest and cloud computing risks
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Law firms are the new banks The new favorite targets of cyber …
Fake updater destroys software’s ability to auto-update
A new type of malware variants was discovered by researchers of Vietnam-based security company Bkis. The variants look like the legitimate update programs of popular software …
Lawsuit-threatening spam campaign links to malware
A bevy of emails purportedly coming from New York-based law firms Crosby & Higgins, and Marcus Law Center has been hitting inboxes around the world, CA warns. With the …
TJX hacker receives massive sentence
Albert Gonzales – the infamous “TJX hacker” – was sentenced yesterday to 20 years in prison, after being found guilty of organizing a gang of cyber …
Rogue software details: Home Personal Antivirus
Home Personal Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Rogue toolbars phish for Facebook credentials
Two rogue toolbars have been spotted in the wild by Sunbelt researchers. At first glance, they look legitimate enough. Purportedly enabling the user to cheat at popular Zynga …
Fake App Store spam leads to malware
Websense warns about a fake Apple App Store spam campaign that is doing the rounds of inboxes. The user receives an email such as this one: If the recipient follows the link …
Pwn2Own 2010: IE8, Firefox, Safari and iPhone go down
IE8, Firefox, Safari and iPhone went down in mere minutes at this year’s Pwn2Own contest held at the CanSecWest conference in Vancouver. Here is the rundown according to …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!