New Linksys wireless routers
Cisco unveiled a new line of Linksys wireless routers, designed to let its core audience of tech experts and enthusiasts take their home networking experience to the next …
Blackhat SEO techniques
The business of using blackhat Search Engine Optimization (SEO) techniques to impregnate legitimate sites has become a huge money-spinner for cybercriminals. Every day scores …
Researcher exploits PDF file without using a vulnerability
Didier Stevens, security researcher and expert on malicious PDF files, has succeeded in creating a proof-of-concept PDF file that uses the launch action triggered by the …
Social networking risks under little control
While social media is pervasive in organizations worldwide, usage has far outpaced controls, according to the latest study conducted by Palo Alto Networks. The degree of …
Beware targeted attacks around tax season
With the tax filing deadline less than three weeks away, we’re entering the busiest time of the tax season according to the IRS. Last year, almost 95 million people …
Root issues causing software vulnerabilities
A survey on software security assurance conducted during the Security B-Sides conference shows 50% of software companies say security is “always a concern.” More …
Korea becomes world’s biggest malware producer
Korea has taken over from the US as the world’s largest producer of Internet viruses, according to analysis of internet threats in March by Network Box. Korea now …
Microsoft releases out-of-cycle IE security patch
Microsoft released a cumulative security update which resolves nine privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most …
Malware spread fueled by fear of money loss
Cyber crooks have learned long ago that potential targets respond well to scare tactics, and this the kind of social engineering approach that two recent spam campaigns …
SEO poisoning campaign about Moscow subway explosions
Another SEO poisoning campaign has been started by conscienceless cyber criminals – this one takes advantage of the people’s interest in the news regarding the …
Break TrueCrypt hard drive encryption quickly
The latest version of Passware Kit Forensic has become the first commercially available software to break TrueCrypt hard drive encryption without applying a time-consuming …
There is no such thing as Facebok AV
A rogue application claiming to be a Facebook AV has been spreading through the Friends list of its targets. Once installed, the application spreads by taking a picture like …
Featured news
Resources
Don't miss
- Your dependencies are 278 days out of date and your pipelines aren’t protected
- Security debt is becoming a governance issue for CISOs
- BlacksmithAI: Open-source AI-powered penetration testing framework
- When cyber threats start thinking for themselves
- IronCurtain: An open-source, safeguard layer for autonomous AI assistants