Zeus source code: from $100K to free in a matter of months
Reports are coming in that the source code for Zeus, a long-running trojan that has been modified many times since the summer of 2007, is now available on several underground forums.
More results...
Reports are coming in that the source code for Zeus, a long-running trojan that has been modified many times since the summer of 2007, is now available on several underground forums.
The reputation of the apparent cybercriminal’s playground that is Facebook took another battering this week after a Symantec researcher revealed that as many as 100,000 Facebook applications are leaking data to third parties.
The theft of credit and debit card numbers from PIN-pad tampering at Michaels stores in the Chicago area extends nationwide, the company admitted this week.
The Canadian government is vulnerable to a security breach similar to the US government’s WikiLeaks snafu that resulted in the leak of hundreds of thousands of sensitive documents, concluded an internal government report.
Microsoft’s acquisition of Skype for $8.5 billion has not gone down well in some quarters, with some experts questioning the wisdom of allowing the Redmond giant access to such a massive unified communications service.
The Jericho Forum has taken the wraps off a set of best practice identity principles – enshrined in a set of commandments – which seek to lay down the ground rules for IT security professionals when dealing with the complex world of digital identities.
The Jericho Forum has taken the wraps off a set of best practice identity principles – enshrined in a set of commandments – which seek to lay down the ground rules for IT security professionals when dealing with the complex world of digital identities.
The reputation of the apparent cybercriminal’s playground that is Facebook took another battering this week after a Symantec researcher revealed that as many as 100,000 Facebook applications are leaking data to third parties.
Many organizations are not equipped to prevent and respond to web infrastructure failures caused by distributed denial of service (DDoS) attacks and Domain Name System (DNS) failures, according to research commissioned by VeriSign.
A researcher at the Context Information Security consulting firm has identified a number of serious vulnerabilities in the new WebGL 3D graphics standard enabled by default in Firefox 4 and Google Chrome browsers, and as an option in the Apple Safari b…