How to steal pictures with Google’s Picasa – XSS demo
From a blog post on xs-sniper.com: “We’ve posted a snippet of some of the research we’ve done on Cross Application Scripting and URI exploitation. It’s …
Hosting firm’s support database a target of malicious activity
Todd Abrams, the CEO of Layered Technologies released a statement in which he stated that the company’s support database was a target of malicious activity on the …
AIRRAID2 wireless hacking tournament
AIRRAID2 s a cutting-edge wireless and wired hacking tournament that challenges participants with WiFi and Bluetooth wireless hacking against an enterprise infrastructure …
Amazon-inc.com phishing e-mails
There is a new batch of Amazon phishing e-mails. The address linked inside the message goes to a random collection of quite possibily compromised computers and afterwards …
Quick start program for shielding vulnerabilities in Electronic Health Record systems
In response to recent findings of the eHealth Vulnerability Reporting Program (eHVRP) study (PDF) announced on Monday, Third Brigade, a security software company specializing …
Prevent data theft from smartphones and PDAs with new SecuBox
Aiko Solutions today released SecuBox 1.3, a powerful solution for encrypting sensitive information carried on Windows Mobile smartphones and PDAs. SecuBox 1.3 offers full …
New Kerio WinRoute Firewall with Internet monitoring module
Kerio WinRoute Firewall 6.4 was just released the other day. A new version of the Internet monitoring module in Kerio WinRoute Firewall, Kerio StaR, has added enhanced, …
Survey shows average cyber-losses jumping after five-year decline
The Computer Security Institute (CSI) released its 2007 report with news that the average annual loss reported by U.S. companies in the 2007 CSI Computer Crime and Security …
New attacks that exploit widgets and gadgets are imminent
Seemingly innocent Widgets (or Gadgets) are exposing computer users to a whole host of attacks. The findings are one of a number uncovered by Finjan’s Malicious Code …
IBM Report: stealthy, targeted online attacks continue to grow in 2007
IBM today reported an increase in malware volume and sophistication, the rise of exploit leasing and a lower number of vulnerability disclosures versus the first half of 2006 …
eHealth Vulnerability Reporting Program study findings
The board of the eHealth Vulnerability Reporting Program (eHVRP.org), today made public the results of a fifteen-month study assessing the security risks associated with …
This week’s new strains of malware
The LunchLoad.A and FakeGoogleBar.M Trojans are the two new strains of malware in this week’s PandaLabs report. LunchLoad.A reaches systems under the name backup2_36. …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online