Please turn on your JavaScript for this page to function normally.
“Bombshell” McGee leads to malware

Did anybody doubt that the recent revelation of Hollywood star Sandra Bullock’s marital troubles and alleged infidelity of her (also) famous husband would become one of …

Beware of malicious freebies

Sooner or later, we are all temped into downloading free software from the Internet – be it an application or a game. Most of the time, the program is legitimate and …

11 Chrome flaws patched, browser ready to survive Pwn2Own contest?

In a bid to make Google Chrome more difficult to compromise during the Pwn2Own contest that will be held during the CanSecWest conference less than a week from today, Google …

Cybersecurity bill changes, US president not permitted to shut down the Internet

Six months ago, two bills regarding cybersecurity were introduced in the US senate and a lot of people objected to the possibility that the bills would allow the US president …

Keynesis Lockngo Professional 4.0

Keynesis Lockngo is a portable application that encrypts and hides your portable drive on Windows AND Mac without any installation. The only thing required to activate the …

Should major ISPs join the fight against botnets?

The recent “de-peering” of the AS-Troyak ISP and its consequent struggle (and relative success) to reconnect to the Internet has put into the spotlight the tangled …

Facebook “password reset” scam hits inboxes

Yet another “password reset” scam has been hitting the inboxes of Facebook users lately, warns McAfee: The email contains a zipped file that supposedly contains …

Malware through hardware still around

Following the security fiasco that was the shipping of a HTC Magic phone complete with pre-installed malware, one would think that Vodafone could come up with a better excuse …

Malicious ads on email service lead to malware

If you haven’t yet disabled JavaScript on your browsers, it’s high time to do it. TrendLabs warns about malicious advertisements popping up for users visiting a …

Feds on social networks: What can they do?

Should law enforcement agents be allowed to go “undercover” on social networks and collect information about the suspects? In the real, physical world, they …

20 critical Apple vulnerabilities to be revealed

Charlie Miller, the security researcher renowned for hacking Apple products during many a hacking competition, will be making public (at the CanSecWest security conference …

Fake PIN pad units in US chain store

As soon as we got used to the idea that we have to be very careful when using ATMs because they might be “skimming” devices attached onto them, we have to …

Don't miss

Cybersecurity news