- By Lucian Constantin
- July 14th, 2010
Serious Cisco IE 3000 Switches Vulnerability Will Be Fixed in August
Workaround available in the meantime
- By Lucian Constantin
- June 5th, 2010
Critical Flash Player and Reader Vulnerability Exploited in the Wild
Mitigation available
- By Lucian Constantin
- May 12th, 2010
Zero-Day Remote Code Execution Bug Found in Safari
Yet to see a patch
- By Lucian Constantin
- April 29th, 2010
Highly Critical Vulnerability Discovered in Opera 10.52
Patch available
- By Lucian Constantin
- February 19th, 2010
Exploit Code Available for Unpatched Firefox Bug
Firefox 3.6 affected
- By Lucian Constantin
- January 25th, 2010
Unlicensed vBulletin and IP.Board Installations in Danger UPDATED
Possibly vulnerable to unauthorized directory listing
- By Lucian Constantin
- January 7th, 2010
Juniper Warns of Critical Vulnerability in Its Routers
The stability of large Internet portions at risk
- By Lucian Constantin
- January 4th, 2010
Small Businesses Should Conduct Online Banking from Dedicated Computers
The FBI and the American Bankers Association advise
- By Lucian Constantin
- December 16th, 2009
Zero-Day Adobe Reader Exploit Found in the Wild
Users are recommended to disable JavaScript or blacklist the affected API call
- By Lucian Constantin
- December 12th, 2009
FBI Warns About the Scareware Threat
Estimates damages of $150 million to users
- By Lucian Constantin
- October 21st, 2009
Lack of Security in Routers Distributed by Time Warner
Around 67,000 insecure devices deployed to customers
- By Lucian Constantin
- October 9th, 2009
Adobe Reader Users Targeted Again via Unpatched Vulnerability
Disable JavaScript until next Tuesday
- By Catalin Cimpanu
- September 15th, 2009
MSN Phishing Scam Exploiting Your Curiosity
Phishers target our curiosity and paranoia
- By Catalin Cimpanu
- August 25th, 2009
Cisco's WLAN Access Point Vulnerability
Access points give away network details to hackers
- By Catalin Cimpanu
- August 20th, 2009
E-commerce Technique in Forecasting Security Attacks Under Study
Scientists use Google PageRank and Amazon techniques in predicting attacks
- By Catalin Cimpanu
- August 20th, 2009
Hackers Prefer SQL Injections and Social Networks
Web 2.0 websites are the target of most attacks
- By Catalin Cimpanu
- August 17th, 2009
TwitBlock Is Trying the Impossible: Block Twitter Spam
A tool to discover and block Twitter spam