Please turn on your JavaScript for this page to function normally.
Destination Hotels card processing system breached

When it comes to cyber attacks and breaches, the hospitality industry has been the most heavily targeted industry in 2009. The reason behind this increased criminal activity …

Spanish firm raided, allegedly sold software with built-in “logic bombs”

Following an anonymous tip submitted on the portal of the Spanish Guardia Civil’s division for hi-tech crimes, the investigators have raided the offices of an …

SSCP Video Mentor

Yet another title in the Pearson's series for interactive learning that targets users set on obtaining security certifications, SSCP Video Mentor is a combination of DVD and …

FBI fails to decrypt suspect’s hard drives – after 12 months of trying

After 12 months of failed attempts to crack the encryption that protects information held on 5 hard drives that belong to a Brazilian banker suspected of money laundering, the …

Cisco’s access point migration mode leaves networks vulnerable

A feature of Cisco’s Aironet 1200 Series Access Point can be abused by hackers to gain access to a company network, claim researchers from Core Security Technologies. …

A closer look at East-Tec Eraser 2010

East-Tec Eraser 2010 (v. 9.7) protects your privacy, identity and confidential information while removing all evidence of your computer and online activity. It erases your …

New site for Google’s encrypted search

When Google unveiled the option of encrypted use of its search engine, people were mostly satisfied. But schools and other educational institutions had a problem with this new …

Cyber criminals steal almost $400,000 using a Trojan

A few months ago, a small escrow firm from California was targeted by cyber criminals that managed to transfer almost $400,000 from the firm’s bank account to a number …

YouTube used to peddle a Facebook password stealer

As chance would have it, today is the day when we shine the spotlight on YouTube being used to peddle malicious software. First, we had the showcasing of the capabilities of a …

The longevity of computer worms

Viruses, Trojans, worms. They all enjoy a (sometimes brief, sometimes long) period within which the are at the peak of their game – so to speak – but that period …

YouTube used to showcase DDoS software

Legitimate businesses use all that the Internet offers to make their sales go up. And even though the use of social media tools can affect office productivity and be an entry …

Eminem death video leads to malware

The death of a world-famous celebrity is always top news, and it’s regularly exploited by cyber criminals to spread their malicious payloads. I would venture to guess …

Don't miss

Cybersecurity news