Intelligence agency hit by DoS attacks
According to The Local, Sweden is seeing her share of cyber disruptions and attacks this last few days. First a technical error blocked access to hundreds of Swedish websites …
IT professionals don’t use Facebook for work
79 percent of IT professionals use social networking sites such as Facebook and YouTube, while the rest do not use social networking sites at all, according to a recent …
Largest security conference and hands-on training in India
Securitybyte and OWASP India are hosting India’s largest information security event in New Delhi at the Crowne Plaza Hotel on Nov 17th – Nov 20th 2009. The …
Malware writers target online gamers
Online games have been spared so far from massive amounts of malware, but things seem to change lately, as more and more malware writers concentrate their efforts on writing …
Windows 7 vulnerable to most viruses
Windows 7 was touted as a big improvement on Vista, security aspect included. The Sophos team wanted to test that assertion, so they installed a full release copy of the new …
Hacked iPhones held hostage
Dutch T-mobile customers that use jailbroken iPhones got a nasty surprise yesterday. A “message” popped up on their screen claiming that their iPhone’s been …
Hardware hacker charged with aiding computer intrusion and wire fraud
Ryan Harris aka DerEngel, a hardware hacker/modder and author of a book on hacking cable modems has been charged with conspiracy, aiding and abetting computer intrusion and …
What information security might look like in a decade
Esther Dyson, a former chair of the Electronic Frontier Foundation and the ICANN, and a long-time successful investor in IT start-ups, addressed on Sunday the crowd gathered …
Discover security flaws in source code with Graudit
Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep. Graudit supports scanning code …
Christmas spam starts early this year
It seems that retailers are not the only ones to have hurried up with getting advantage of Christmas as a magic, profit-enhancing word. Spammers are know for their heightened …
Find potential exploit conditions in Microsoft Office documents
OfficeCat is a command line utility developed by the Sourcefire VRT that can be used to process Microsoft Office Documents to determine the presence of potential exploit …
Trojans dominate BitDefender’s top 10 e-threats list
The top spot on BitDefender’s top 10 e-threats list for October is once again Trojan.Clicker.CM, which is mostly present on websites hosting illegal applications such as …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)