Thanksgiving scams: Warming up for Christmas

Sometimes it is difficult to tell the difference between legitimate online offers and malicious spam. In this day and age, you can be pretty sure that financial and government …

iPhone anti-virus software: Has the time come?

Anti-virus software has already been made available for various mobile phones. Security firm F-Secure offers protection for phones with Windows Mobile and Symbian and …

5 handy WordPress security plug-ins, part 2

If you’re one among the millions of users of WordPress, and you really don’t have that much knowledge about what’s going on under the hood, your best bet to …

Skype users targeted by Koobface look-alike

Trend Labs warn about a seeming Koobface variant – TROJ_VILSEL.EA – that targets Skype. It steals information from the user’s Skype profile: login …

Macbook Air prize spam delivers malware

A good rule of thumb when it comes to unsolicited email offers or announcements should be: If it’s too good to be true, it probably is. Add to this grammatical and/or …

Cloud computing pros and cons

Cloud computing – what is it exactly and what benefits does it bring? A new white paper from ISACA describes how enterprises can achieve greater efficiencies and …

IE8 exposes sites to XSS attacks

It’s a little bit ironic when the thing that you put in place to protect you from certain attacks, it’s the thing that, in the end, makes you vulnerable to them. …

MySpace phishing and malware combo

F-Secure warns about phishing emails that urge users to update their MySpace accounts. If you fall for the trick and follow the link, you are taken to a fake MySpace page, …

FBI’s network against cyber crime

Last week, when the Senate’s Subcommittee on Terrorism and Homeland Security held a hearing entitled “Cybersecurity: Preventing Terrorist Attacks and Protecting …

iPhone worm turns devices into zombies

It took three weeks for someone to again take advantage of the vulnerability that leaves the owners of jailbroken iPhones exposed to attacks, and this time the attack is …