Please turn on your JavaScript for this page to function normally.
4chan users take MPAA, RIAA websites down with DDoS attacks

The websites of the Motion Picture Association of America (MPAA) and Indian tech firm Aiplex Software were crashed by DDoS attacks yesterday. The architects and executors of …

Google rolls out 2-factor authentication for Gmail and Apps

In view of the ever increasing number of successful phishing attacks that leave users with compromised accounts, Google has announced the introduction of two-step verification …

Cybercriminals steal Interpol Chief’s identity to access info on fugitives

Ronald Noble, Interpol’s Secretary General, has revealed that cybercriminals have opened two fake Facebook accounts using his name and used them to gather sensitive …

Smartphone security risks and best practices research

ENISA is looking into smartphones and determining best practices for their use while researching the risks. Several manufacturers have been involved: RIM, Google, Microsoft, …

How do we defend the Internet of the future?

As the Internet evolves, it will offer a vast array of possibilities such as new types of health services, personalized and mixed reality entertainment, and more. With new …

Inside backup and storage: The expert’s view

How much data do we create? How do we secure it? Store it? Retrieve it? When professional community Wikibon recently translated the amount of digital information that is …

Google engineer abuses power, violates privacy of minors

A Google Site Reliability Engineer was fired in July after an internal investigation by the company that confirmed that he violated the privacy of several underage users. …

Securing new objects on the Internet landscape

By now, we are all used to hearing that the advent of mobile devices represents a network security nightmare, but they are hardly the only ones we need to worry about. Sensor …

Privacy expectations and the generation gap

Young people and old people use the Internet differently, and their privacy expectations vary. Young people are very fluent with social media – but not necessarily …

Dynamic worm wreaks havoc

A rather industrious worm has been detected by Trend Micro threat analysts, and it usually infects users who have been careless enough to click on a link offered in a variety …

Hotel systems breached and card info stolen all over the U.S.

The payment system at a number of properties of HEI Hospitality – the hospitality operator that runs over 30 upscale hotels across the U.S. under brand names as …

Audit reveals gaping security holes on DHS networks

The recently released results of a security audit performed on the various systems used by the US-CERT to accomplish its cybersecurity mission revealed an unpleasant reality: …

Don't miss

Cybersecurity news