Twitter and Google account vulnerabilities
Nir Goldshlager, a security researcher and penetration tester, discovered some XSS vulnerabilities in Twitter and Google Calendar that can be exploited by attackers to steal …
Criminal found through World of Warcraft
It seems that law enforcement agencies are getting more creative with ways of leveraging dug up information about wanted criminals. Using the knowledge of a previously …
iPhone network sniffer
Pirni is the worlds first native network sniffer for iPhone. The iPhone’s Wi-Fi has some major drawbacks in its hardware design, thus we can not properly set the device …
F-Secure protects smartphone data
F-Secure released its new standalone smartphone solution, Anti-Theft for Mobile which provides three useful security features to protect your phone: remote lock, remote wipe …
Automatic analysis of malware behavior
Malheur is a tool for automatic analysis of program behavior recorded from malware. It has been designed to support the regular analysis of malicious software and the …
File-scanning services for malware writers
A lot of people are aware of and are using online file-scanning services when they want to check if a suspicious file they got as an attachment or have found on their computer …
Rogue software details: SpyEraser
SpyEraser is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Privacy issues of data collecting
Will 2010 see the beginning of a change in regulations regarding net privacy? It’s hard to tell. The issue has been a matter for dispute for quite some time now, but …
Classification of weaknesses and attacks
The Web Application Security Consortium (WASC) released Threat Classification 2.0. The Threat Classification is an effort to classify the weaknesses, and attacks that can lead …
2010: A good year for fighting cybercrime?
McAfee Labs believes cybercriminals will target social networking sites and third-party applications, use more complex Trojans and botnets to build and execute attacks, and …
GSM encryption algorithm cracked
The A5/1 privacy algorithm – more commonly known as the GSM algorithm – has been cracked and published by Karsten Nohl, a German encryption expert. He says his …
Phishers prefer Paypal, Visa, eBay and Amex
Compared to the first half of 2009, the amount of phishing messages has remained relatively unchanged, although phishers have switched their focus to institutions that could …
Featured news
Resources
Don't miss
- Building cyber talent through competition, residency, and real-world immersion
- Browser agents don’t always respect your privacy choices
- Anubis: Open-source web AI firewall to protect from scraper bots
- Session tokens give attackers a shortcut around MFA
- AI isn’t one system, and your threat model shouldn’t be either