Microsoft prepares two security bulletins
Microsoft announced their plan to release two Windows security updates on Tuesday January 8 as part of the regular software patch cycle. One of the bulletins is rated critical …
Facebook widget installs Zango spyware
Fortinet Global Security Research Team discovered a malicious Facebook Widget actively spreading on the social networking site which ultimately prompts users to install the …
Sourcefire 3D gets a Network Intrusion Prevention System Certification from ICSA Labs
Sourcefire 3D System’s 3D3800 Sensor has received Network Intrusion Prevention System certification from ICSA Labs, an independent division of Verizon Business. …
Trojan horses the leading cyber-threat in 2007
Trojans were responsible for 25.83% of infections recorded by ActiveScan, the online scanner from Panda Security, during 2007. This type of malicious code accounted for 77.40% …
New book release: “Mac OS X Leopard: The Missing Manual”
David Pogue’s timely new book “Mac OS X Leopard: The Missing Manual” offers honest, straightforward, and fun-to-read instructions on all things Leopard, …
They really don’t want you to have a happy new year
Sophos is warning workers returning from the New Year holidays to be wary of internet attacks taking advantage of the celebrations. New versions of the Dorf worm (W32/Dorf-AE, …
New way of auditing Oracle and UNIX password security
ElcomSoft has added support for Oracle and UNIX passwords to Elcomsoft Distributed Password Recovery v. 2.10. The latest version of ElcomSoft’s Windows password recovery …
Example of double spam sent to mailboxes and mailing lists
A way of double spamming – combo of spamming email users and mailing lists to get a profit: #1 Spammer sends a spam e-mail to a mailing list that doesn’t have …
Video: information security – before and after public-key cryptography
Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through the 20th century and into the 21st. In the 1970s, …
Guide for assessing the security controls in federal information systems
NIST recently released a draft Special Publication 800-53A, Guide for Assessing the Security Controls in Federal Information Systems. This final public draft provides …
Weekly report on viruses and malware X-mas edition
As for the most harmful malware strains this week, the list is headed by the Virtumonde spyware and the NaviPromo and VideoAddon adware.As for the new samples that appeared …
Bluetooth guardian for Series 60 phones
Symbian Guru released BT Guard – the security software which helps to protect the phone from unauthorized access via Bluetooth. BT Guard changes your Bluetooth status …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations