Please turn on your JavaScript for this page to function normally.
5 handy WordPress security plug-ins

WordPress is one of today’s most popular publishing platforms. Like any other system, it needs security. What follows is a list of 5 practical plug-ins that extend its …

DHS to open new cyber operations center

During a roundtable at RSA Conference Europe last week, Philip Reitinger, U.S. Department of Homeland Security (DHS) Deputy Under Secretary for the National Protection and …

Careless spammer reveals tricks of the trade

I guess it had to happen sooner or later. After looking at who knows how many spam-and-scam occurrences, Patrick Fitzgerald of Symantec has struck gold while investigating the …

A closer look at Acunetix Web Vulnerability Scanner 6.5

Web applications are accessible 24 hours a day, 7 days a week and control valuable data since they often have direct access to backend data such as customer databases. SSL and …

UK’s own “three-strikes” anti-piracy law announced

Following the decision of the European Parliament that enables European member states to approve laws that force ISPs to disconnect individuals from the Internet, the UK is …

Spear phishing scammers target Taiwan officials

TrendLabs reports that they have discovered several instances of “spear phishing”. Spear phishing is a specific type of phishing fraud that involves customizable …

China raising a cyber army?

Coming as a confirmation of the assertions made in the report prepared by the Center for Strategic and International Studies, another independent report released by the …

Phishing trends according to the Anti-Phishing Working Group

The Anti-Phishing Working Group issued the results of a survey they conducted in the first half of 2009, in which they sifted through data they collected and some provided by …

Gawker and Gizmodo visitors preyed on by malicious ads

It was only last month that the New York Times was tricked into featuring on their website a malvertisement that took over the visitors’ browser and tried to make them …

Serious cyber attacks on the horizon

A report prepared recently by James A. Lewis, of the Center for Strategic and International Studies, used the recent cyber attacks that targeted the US and South Korea as a …

Suspected European cyber pirates denied Internet access without court order

The verdict is in: Europeans can be cut off the Internet for persistent file-sharing, and it can be done without a court order. According to ISPreview, the decision comes as a …

Beautiful Security: Leading Security Experts Explain How They Think

In Beautiful Security, a bevy of experts describe how they look at a particular aspect of information security. They offer the knowledge they have acquired through many years …

Don't miss

Cybersecurity news