Black hat hackers on demand

Everybody knows that malicious hacking is illegal, but there are services out there that seem not very concerned with the fact. Some of them have been operating for 3 years …

Five months to detect a breach

When it comes to cyber attacks and breaches, the hospitality industry has been the most heavily targeted industry in 2009. This surprising information is among the findings …

Beware of Chinese bearing gifts

UK businessmen have been warned by the British security service against using “gifts” such as memory sticks or cameras given to them when attending exhibitions or …

A closer look at Gili USB Stick Encryption 2.0

USB flash drives are the most popular way to move data from one PC to another. They are easy to use, convenient, affordable, but at the same time they pose a security risk and …

Congressional web sites defaced

Visitors of websites of some Congressional representatives and of a few committees were greeted on Wednesday evening by a short message with colorful language. The websites …

IE vulnerability offers your files to hackers

Jorge Luis Alvarez Medina, a security consultant working for Core Security, has discovered a string of vulnerabilities in Internet Explorer that make it possible for an …