Please turn on your JavaScript for this page to function normally.
How to steal pictures with Google’s Picasa – XSS demo

From a blog post on xs-sniper.com: “We’ve posted a snippet of some of the research we’ve done on Cross Application Scripting and URI exploitation. It’s …

Hosting firm’s support database a target of malicious activity

Todd Abrams, the CEO of Layered Technologies released a statement in which he stated that the company’s support database was a target of malicious activity on the …

AIRRAID2 wireless hacking tournament

AIRRAID2 s a cutting-edge wireless and wired hacking tournament that challenges participants with WiFi and Bluetooth wireless hacking against an enterprise infrastructure …

Amazon-inc.com phishing e-mails

There is a new batch of Amazon phishing e-mails. The address linked inside the message goes to a random collection of quite possibily compromised computers and afterwards …

Quick start program for shielding vulnerabilities in Electronic Health Record systems

In response to recent findings of the eHealth Vulnerability Reporting Program (eHVRP) study (PDF) announced on Monday, Third Brigade, a security software company specializing …

Prevent data theft from smartphones and PDAs with new SecuBox

Aiko Solutions today released SecuBox 1.3, a powerful solution for encrypting sensitive information carried on Windows Mobile smartphones and PDAs. SecuBox 1.3 offers full …

New Kerio WinRoute Firewall with Internet monitoring module

Kerio WinRoute Firewall 6.4 was just released the other day. A new version of the Internet monitoring module in Kerio WinRoute Firewall, Kerio StaR, has added enhanced, …

Survey shows average cyber-losses jumping after five-year decline

The Computer Security Institute (CSI) released its 2007 report with news that the average annual loss reported by U.S. companies in the 2007 CSI Computer Crime and Security …

New attacks that exploit widgets and gadgets are imminent

Seemingly innocent Widgets (or Gadgets) are exposing computer users to a whole host of attacks. The findings are one of a number uncovered by Finjan’s Malicious Code …

IBM Report: stealthy, targeted online attacks continue to grow in 2007

IBM today reported an increase in malware volume and sophistication, the rise of exploit leasing and a lower number of vulnerability disclosures versus the first half of 2006 …

eHealth Vulnerability Reporting Program study findings

The board of the eHealth Vulnerability Reporting Program (eHVRP.org), today made public the results of a fifteen-month study assessing the security risks associated with …

This week’s new strains of malware

The LunchLoad.A and FakeGoogleBar.M Trojans are the two new strains of malware in this week’s PandaLabs report. LunchLoad.A reaches systems under the name backup2_36. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools