FBI’s network against cyber crime

Last week, when the Senate’s Subcommittee on Terrorism and Homeland Security held a hearing entitled “Cybersecurity: Preventing Terrorist Attacks and Protecting …

iPhone worm turns devices into zombies

It took three weeks for someone to again take advantage of the vulnerability that leaves the owners of jailbroken iPhones exposed to attacks, and this time the attack is …

Latest 0-day Internet Explorer exploit

A new exploit made public by an unknown individual on the BugTraq mailing list on Friday could be soon used for attacking unsuspecting surfers that use Internet Explorer 6 and …

Three charged with Comcast.net hijacking

Three men were charged on Thursday for last year’s redirecting of traffic of Comcast’s website to a site where a shout-out to fellow hackers was featured: …

Poisoned Google search results

Google has been and is very helpful – no doubt about it. But it seems to me that they should try to do something about the poisoned search results problem, otherwise …

Are 64-bit Windows inherently safer?

Microsoft has discovered a way to create the illusion that Windows 7 is more secure than its predecessors simply because it has a 64-bit version of the OS. As Joe Faulhaber of …

Employee data breach at MassMutual

Internetnews reports that the latest data breach to be discovered happened to MassMutual, a Massachussets-based insurance company. One of the company’s employees …

Cyber criminals worked furiously in 2009

Symantec’s Security Responce team took it upon itself to gather information from various sources and thousands of experts and compile a list of threats that marred the …

Firefox 3.6 to prevent harmful add-ons

The soon-to-be shipped version 3.6 of the Firefox browser will have a new feature that will make it more stable. It is called Component Directory Lockdown, and it prevents …

T-Mobile personal user data breached and sold

T-Mobile UK got a nasty surprise when they realized that their customers whose contract was due to expire were being contacted by their competitors. They soon realized that …