Twitter and Google account vulnerabilities
Nir Goldshlager, a security researcher and penetration tester, discovered some XSS vulnerabilities in Twitter and Google Calendar that can be exploited by attackers to steal …
Nir Goldshlager, a security researcher and penetration tester, discovered some XSS vulnerabilities in Twitter and Google Calendar that can be exploited by attackers to steal …
It seems that law enforcement agencies are getting more creative with ways of leveraging dug up information about wanted criminals. Using the knowledge of a previously …
A lot of people are aware of and are using online file-scanning services when they want to check if a suspicious file they got as an attachment or have found on their computer …
Will 2010 see the beginning of a change in regulations regarding net privacy? It’s hard to tell. The issue has been a matter for dispute for quite some time now, but …
The A5/1 privacy algorithm – more commonly known as the GSM algorithm – has been cracked and published by Karsten Nohl, a German encryption expert. He says his …
Trend Micro Internet Security detects and removes viruses, spyware, and other threats from your computer, email, instant messages, and downloads, blocks untrustworthy links in …
Why do employees steal? As you will see in the book, it is a combination of motivation, opportunity and attitude. But it is all underlined by the issue of trust, which is …
Hounded by law enforcement agencies and security experts, cyber criminals have been witnessing the ISPs and hosting providers of their botnets being shut down at a greater …
Panda’s ActiveScan is an online security solution that scans your computer for viruses, worms and Trojans, spyware and other Internet threats. It detects and eliminates …
A new clickjacking attack has targeted Facebook users. It presents itself in the form of a comment on the users’ account looking like this: The photos are, obviously, …
Any occasion seems to be good lately to launch a SEO poisoning campaign. Zscaler reports that searching for information about the Winter Solstice (21st of December) has been …
Earlier today, on the official White House blog, it has been announced that the post of Cybersecurity Coordinator will be filled by Howard A. Schmidt, a well-known name in the …