Zeljka Zorz
Hacking: The Next Generation
We have all been witnessing new kinds of attacks emerging thanks to new technologies and ways of using our computers and networks. The use of social media, an increasingly …
Cybersecurity expert: Job guaranteed
Computer security used to be regarded as a boring and less important field of computer science, but with the proliferation of computer threats (from malware to active attacks) …
A closer look at Symantec Security Check
Symantec Security Check is a web-based scan that combines two features: a Security Scan and Virus Detection. To use it, you will be asked to download some components and …
The Pentagon waiting for its computer networks defense command
The Pentagon had planned to launch a cyber command that would be responsible for defending its global network of computer systems on October 1, following it by the appointment …
Twitter and Google account vulnerabilities
Nir Goldshlager, a security researcher and penetration tester, discovered some XSS vulnerabilities in Twitter and Google Calendar that can be exploited by attackers to steal …
Criminal found through World of Warcraft
It seems that law enforcement agencies are getting more creative with ways of leveraging dug up information about wanted criminals. Using the knowledge of a previously …
File-scanning services for malware writers
A lot of people are aware of and are using online file-scanning services when they want to check if a suspicious file they got as an attachment or have found on their computer …
Privacy issues of data collecting
Will 2010 see the beginning of a change in regulations regarding net privacy? It’s hard to tell. The issue has been a matter for dispute for quite some time now, but …
GSM encryption algorithm cracked
The A5/1 privacy algorithm – more commonly known as the GSM algorithm – has been cracked and published by Karsten Nohl, a German encryption expert. He says his …
A closer look at Trend Micro Internet Security 2010
Trend Micro Internet Security detects and removes viruses, spyware, and other threats from your computer, email, instant messages, and downloads, blocks untrustworthy links in …
Insidious: How trusted employees steal millions and why it’s so hard for banks to stop them
Why do employees steal? As you will see in the book, it is a combination of motivation, opportunity and attitude. But it is all underlined by the issue of trust, which is …
Cyber criminals become their own ISPs
Hounded by law enforcement agencies and security experts, cyber criminals have been witnessing the ISPs and hosting providers of their botnets being shut down at a greater …
Featured news
Sponsored
Don't miss
- How open-source MDM solutions simplify cross-platform device management
- Google on scaling differential privacy across nearly three billion devices
- Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups
- North Korean hackers pave the way for Play ransomware
- IoT needs more respect for its consumers, creations, and itself