Zeljka Zorz
A closer look at Trend Micro HijackThis 2.0.2
HijackThis is a tiny program helps you get rid of persistent spyware by examining vulnerable or suspect parts of your system, such as browser helper objects and certain types …
Report: Half way through the Month of Facebook Bugs
Half a month has passed since the start of theharmonyguy‘s project aimed at finding and posting XSS/CSRF vulnerabilities in Facebook applications. He planned to post one …
Hathaway on cyber security for the first time after leaving the White House
Former cyber security czar Melissa Hathaway addressed the public for the first time since resigning her post of Acting Senior Director for Cyberspace for the National Security …
Vast malware repository dedicated to testing and research
Frame4 Group is a Dutch company that has made its name specializing in different fields within IT: project and change management, process engineering, test coordination and …
Web 2.0 Architectures
What is Web 2.0? There is still no definitive and all-encompassing definition for the phenomenon, and there probably never will be. One thing that is known for sure is that it …
Is it possible for data to be both anonymous and useful?
The hoarding of data by companies is usually accompanied by the assurance that all the obvious identifiers (name, address, Social Security number) have been deleted – …
Google Book Search settlement: Will it include privacy rules?
It’s already common knowledge that Google intends to build the biggest, most comprehensive online library and bookstore there is. And maybe you’re thinking: …
A closer look at F-Secure Internet Security 2010
Following a redesign of their logo and their motto, F-Secure redesigned their Internet Security suite. F-Secure Internet Security 2010 is a security solution designed for …
7 tips for basic e-mail security
Simple to implement, these tips can be a good start to making sure your e-mail communication becomes more secure. 1. Understand that no e-mail communication is 100% secure. We …
September: Month of Facebook bugs
There is an interesting project started by a security researcher that goes by the handle theharmonyguy. Using as a inspiration the “Month of Twitter Bugs”, he …
The Bento Book: Beauty and Simplicity in Digital Organization
Bento is a database for people who need more than a spreadsheet, but less than a full-fledged complex database. It was designed with Mac users in mind, and integrates Mail, …
What do we know about the Conficker worm?
According to John Markoff, we know what the Conficker worm does and how it does it, but little else. Who made it? What purpose does or will the network of 5 million zombie …
Featured news
Sponsored
Don't miss
- 100+ domains seized to stymie Russian Star Blizzard hackers
- October 2024 Patch Tuesday forecast: Recall can be recalled
- Best practices for implementing threat exposure management, reducing cyber risk exposure
- Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
- CUPS vulnerabilities could be abused for DDoS attacks