File containing confidential data from 30,000 users
A version of Apophis, a tool used by cyber-crooks to handle information stolen from users infected by several variants of the Nuklus family of Trojans, stores data belonging …
Windows patch updates blamed for Skype problems?
Although a Russian security forum speculated about a possible exploit that caused major problems for the Skype network, Skype announced the following: “On Thursday, 16th …
Secure USB 2.0 drives with hardware-authentication lock
Corsair launched the “Flash Padlock” family of affordable USB 2.0 drives, the safest way to secure your data while on the go. Priced starting at only $29.99 USD …
Latest malware threat roundup and forecast PDF report
Trend Micro today published the TrendLabs Semi-annual Threat Roundup and Forecast. Analyzing malware trends that influence the economic growth of the malware world, the report …
New book – “Securing Ajax Applications”
Securing Ajax Applications covers basic security techniques and examines vulnerabilities with JavaScript, XML, JSON, Flash, and other technologies. Wells, also, clearly and …
Computer Forensics Library Boxed Set
“Computer Forensics Library Boxed Set” includes three previously published books: “Forensic discovery” (020163497X): Definitive guide that presents a …
Worm with SMTP and dialer engine
The focus of this week’s PandaLabs report are RegisteredLetter.A worm and ZLFake.A backdoor. RegisteredLetter.A is designed to make a series of changes on infected …
Snort creator acquires ClamAV open source network anti-virus project
Sourcefire announced that it has acquired ClamAV, a leading open source gateway anti-virus and anti-malware project. Sourcefire’s first acquisition since its Initial …
Man sentenced for buying stolen identities
Sophos has welcomed news that US authorities have sentenced a man to seven years in prison for buying stolen identities from online forums run by cybercriminals in other …
Video: a new class of SQL vulnerability
Martin McKeay caught up with Ivan Arce, CTO for Core Security to talk about a new class of SQL vulnerability that’s dependent on a algorithm common to most SQL …
Details on the compromised Ubuntu servers
Ubuntu Wiki: This last week, 5 of the 8 servers that are LoCo hosted but Canonical sponsored, had to be shut down due to reports that they were actively attacking other …
Details on recent Microsoft vulnerabilities
Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations