Please turn on your JavaScript for this page to function normally.
The state of encryption in Europe

It is a well know fact that IT employees are a special breed. They may be seen as overly paranoid and sometimes very singleminded and demanding about the issue of security and …

Digital fingerprints to identify hackers

How can you retaliate against a cyber attacker if you don’t know who he is? As we have witnessed lately, attribution of an attack is quickly becoming one of the biggest …

Hackers prey on Google workers’ friends

It has been discovered that the hackers who mounted the attacks on Google, Adobe and other companies recently breached, have targeted friends of employees that had access to …

US oil industry targeted by cyber attacks

It seems that the high profile breaches of Google and Adobe have been just the latest target in the Chinese march through US networks. ExxonMobil, Marathon Oil and …

The dangers of selling online

Buying online can get you scammed, for sure – but what about selling? You may think that you wouldn’t give up the item without seeing hard cash in your hand or the …

Deep packet inspection – illegal or not?

Virgin Media’s plan to monitor traffic on its networks to assess the percentage and nature of illegal file-sharing may be soon hitting a roadblock, since Privacy …

Using spam to beat spam

How to make a full-proof spam filter that will not block any of the legitimate email? A team at the International Computer Science Institute in Berkeley, California, and the …

Blippy, a great service for phishers?

Blippy, a new service that lets you twitter (blipper?) your recent purchases made with a credit card of your choice, could be a valuable tool for cyber criminals, warns …

Johnny Depp is not dead – but you might be infected

The fake news of the death of one of the most popular actors of today has been used by hackers to infect you with Trojans. According to Sophos’ Graham Cluley, the rumor …

80% of U.S. government domains still without DNSSEC

Eighty percent of all U.S. federal agencies didn’t succeed in deploying DNSSEC on their Web sites by the end of 2009, as demanded by the U.S.’s government mandate …

Tor Project infrastructure breached, users advised to upgrade

Tor users have been advised to upgrade to Tor 0.2.1.22 or 0.2.2.7-alpha, following a security breach that left two of the seven directory authorities compromised (moria1 and …

Unknown virus brings down UK university network

The network of UK’s University of Exeter was hit on Monday by what they claim “is a completely new virus and we are the only organisation in the world to …

Don't miss

Cybersecurity news