Please turn on your JavaScript for this page to function normally.
NBC News Twitter account hijacked by using a Trojan?

On the very eve of the tenth anniversary of the September 11 attacks, the NBC News Twitter account begun posting messages saying that two civilian airplanes have been hijacked …

SecurityByte: Cyber conflicts, cloud computing and printer hacking

Located twenty kilometers south of the city of Bangalore, Electronic City is the Indian version of Silicon Valley. Ever since the first phase of the project was finalized, the …

KillSwitch technology catches brute-force attacks

Confident KillSwitch is an authentication technology that can identify and proactively defend against brute force attacks on account logins, password reset processes, …

Entrust strengthens mobile security with device authentication

In an era when mobile devices are commonplace, Entrust introduces a straightforward method for adding digital certificates to mobile devices – and with little management …

New OAuth toolkit

Layer 7 Technologies unveiled its OAuth Toolkit, an enterprise-class solution to provide a generalized framework for handling a broad range of OAuth scenarios across cloud, …

Mac OS X Lion login password easily revealed

Mac OS X stores user login passwords in system memory even if the computer is locked or put into a sleep mode. The vulnerability is present in all modern versions of Mac OS X, …

Enterprises fail to control mobile access

The results of a Courion survey of 988 IT decision makers at large organizations indicate that whilst organizations are confident that they can assure appropriate user access …

Verizon takes on issue of stolen credentials

Unauthorized access to corporate networks through stolen user names and passwords topped 45 percent in 2010, making credentials the second most compromised data type, …

The future of identity verification through keystroke dynamics

When someone mentions biometrics, the first (and sometimes the only) thing that comes to mind to many people are physical characteristics on the basis of which people can be …

Multi-function fingerprint sensor for tablets and notebooks

AuthenTec announced its newest smart sensor for the PC market, the AES2665, which is integrated in the TouchStone package module, gives PC and tablet users security, enhanced …

Certification authority reports security breach

Another certification authority has fallen prey to attackers in need of certificates for phishing authentication pages. The authority in question is StartSSL, operated by …

Dropbox security glitch allowed anyone to access user accounts

Web-based file hosting service Dropbox has confirmed that a bug introduced by a code push allowed anyone to access any user account by simply typing in a random password for a …

Don't miss

Cybersecurity news