Please turn on your JavaScript for this page to function normally.
Fixing the Internet is…easy?

There’s no need to enumerate the dangers that Internet use poses for our security and privacy – we are, sadly, all too aware of what they are and how much they …

“Hidden Iron Man 2 scene” Facebook scam

Curiosity – that drive to know new things – is a double-edged sword. It fuels our inclination towards exploration and, consequently, learning, but it can also …

Malicious tweets keep coming and changing

There is no end in sight for malicious postings on Facebook and Twitter. And although Facebook has become quite adept at spotting them and blocking the malicious links …

Sign of the times: Social engineering contest at Defcon

It is a well known fact that Defcon regularly organizes capture-the-flag-style contests that see hackers pitted against each other in an effort to protect their own systems …

Fake Facebook account deactivation email

Sunbelt reports that in a spam run that may at first glance appear to be a phishing attempt aimed at getting your login credentials, mailboxes around the world have been …

U.S. intelligence analyst arrested for passing on classified items to Wikileaks

A 22-year old Army intelligence analyst from Maryland has been arrested by U.S. Federal officials two weeks ago after he boasted about providing Wikileaks with combat videos …

Critical Adobe Flash, Reader 0-day flaw exploited in the wild

A zero-day flaw affecting 10.0.x and 9.0.x versions of Adobe Flash Player – including the current version, which is 10.0.45.2 – has been spotted being exploited in …

Rootkits on Android smartphones

As our mobile phones get “smarter” and our personal and professional lives get increasingly mobile, the possibility of these devices getting compromised and the …

Facebook fights rogue apps with verification program

In view of all the rogue applications that have lately targeted Facebook users, the announcement that the social network will require developers to verify their Facebook …

U.S. Senators keep trying to give “cyber emergency” powers to federal government

Not so long ago, a simulated cyber attack showed the unpreparedness of the United States to deal effectively with such an occurrence. When the officials “playing” …

Europe finds search data retention policies inadequate

The Article 29 Data Protection Working Party (an independent European Commission advisory body) has lately been much in the news, owning to their interest towards protecting …

Samsung smartphone shipped with malware-infected memory card

The latest mass-market product that has been found being shipped to customers while containing malware is the Samsung S8500 Wave phone with the Samsung bada mobile platform. …

Don't miss

Cybersecurity news