Researcher exploits PDF file without using a vulnerability
Didier Stevens, security researcher and expert on malicious PDF files, has succeeded in creating a proof-of-concept PDF file that uses the launch action triggered by the …
Social networking risks under little control
While social media is pervasive in organizations worldwide, usage has far outpaced controls, according to the latest study conducted by Palo Alto Networks. The degree of …
Beware targeted attacks around tax season
With the tax filing deadline less than three weeks away, we’re entering the busiest time of the tax season according to the IRS. Last year, almost 95 million people …
Root issues causing software vulnerabilities
A survey on software security assurance conducted during the Security B-Sides conference shows 50% of software companies say security is “always a concern.” More …
Korea becomes world’s biggest malware producer
Korea has taken over from the US as the world’s largest producer of Internet viruses, according to analysis of internet threats in March by Network Box. Korea now …
Microsoft releases out-of-cycle IE security patch
Microsoft released a cumulative security update which resolves nine privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most …
Malware spread fueled by fear of money loss
Cyber crooks have learned long ago that potential targets respond well to scare tactics, and this the kind of social engineering approach that two recent spam campaigns …
SEO poisoning campaign about Moscow subway explosions
Another SEO poisoning campaign has been started by conscienceless cyber criminals – this one takes advantage of the people’s interest in the news regarding the …
Break TrueCrypt hard drive encryption quickly
The latest version of Passware Kit Forensic has become the first commercially available software to break TrueCrypt hard drive encryption without applying a time-consuming …
There is no such thing as Facebok AV
A rogue application claiming to be a Facebook AV has been spreading through the Friends list of its targets. Once installed, the application spreads by taking a picture like …
61% of new threats are banker Trojans
PandaLabs published its report analyzing the IT security events and incidents of the first three months of the year. The amount of new malware in circulation has continued to …
Nmap includes detection script for major remote vulnerability in Mac OS X
Nmap is a free and open source utility for network exploration or security auditing. Nmap 5.30BETA1 was released today. Top features include: 37 new NSE scripts, bringing the …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)