Cybercrime and Espionage
The authors, seasoned experts in the information security field with obvious intelligence insights, provide the readers with an interesting overview of the current biggest …
Global phishing trends and domain name use
A new survey by the Anti-Phishing Working Group (APWG) reveals that phishing attacks perpetrated against Chinese e-commerce and banking sites soared by 44 percent in the first …
Computershare insider loses USBs with stolen customer financial data
Computershare, one of the largest financial market services and technology providers in the world, has filed a suit with the Massachusetts District Court against former …
Angry Birds know where you live
75% of the public may be giving away their physical location when downloading smartphone applications, according to AdaptiveMobile. 69% of smartphone users are adamant that …
Browser bloat and privacy concerns
An increase in browser-based bloat and malware, and growing concern over online tracking technology, will top the technology trends in 2012, according to SlimWare Utilities. …
Mobile screen-spy software recreates passwords
When one types text messages, emails and login credentials on one’s virtual iPhone or Android keyboard, larger bubbles containing each character pop up for a second …
Carbonite privacy blunder results in spam
Popular online backup service Carbonite has made another privacy misstep. Computerworld blogger Richi Jennings, a self styled “anti-spam wonk”, has discovered that …
Americans will sue if personal data is compromised
Americans will go to great lengths to avoid identity theft, and many say they would take legal action against government or private organizations that compromise their …
Secure replacement for the Certificate Authority System
Convergence is a secure replacement for the Certificate Authority System. Rather than employing a traditionally hard-coded list of immutable CAs, Convergence allows you to …
Irresponsible IT disposal methods
Although data security is the primary concern when decommissioning IT equipment, only 61 per cent of companies currently data wipe all of their redundant computers, according …
180,000 Swedes at risk following password-hacking spree
Registered members of around 60 popular Swedish websites are in danger of having their stolen login credentials misused by cyber crooks in the wake of the biggest ever …
Personal info of 9 million Israelis stolen, available online
Personal information of some 9 million Israelis (alive and deceased) has been stolen by a contractor working for the country’s Ministry of Labor and Welfare with the …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do