Please turn on your JavaScript for this page to function normally.
Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights

Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights Here’s an overview of some of last …

Week in review: Cheap cellphone tracking, Apple’s Gatekeeper, and Google secretly bypasses Safari’s “no tracking” settings

Here’s an overview of some of last week’s most interesting news and articles: Privacy pitfalls of online dating It used to be that you were pretty much anonymous …

Week in review: pcAnywhere code leaked, Trustwave revokes “MitM” certificate, and top reasons for IT layoffs in 2011

Here’s an overview of some of last week’s most interesting news, articles and interviews: Compromised DreamHost-hosted websites lead to scams Hundreds of websites …

Week in review: Reactions to VeriSign hack, Anonymous leaks FBI conference call, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: The F-BOMB: A tiny $50 spying computer for DARPA As …

Week in review: “Frankenmalware”, Kelihos malware author revealed, and the tragic state of SCADA security

Here’s an overview of some of last week’s most interesting news: Tool used in Anonymous Megaupload campaign Looking at the LOIC downloads so far this year, …

Week in review: Zappos, Symantec breaches, identities of Koobface gang revealed, and Megaupload shutdown

Here’s an overview of some of last week’s most interesting news and podcasts: Google Docs hosted phishing schemes abound Sophos has recently spotted two distinct …

Week in review: Currency rounding attacks, Trustworthy Computing Initiative anniversary, and how to foil targeted attacks

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Most unusual laptop recovery stories From the good, the bad, and …

Week in review: Leaked Symantec code, the grayware problem, and securing Android for the enterprise

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: Hackers aim to fight Internet censorship with own communication …

Week in review: Stratfor breach, brute-forcing WAPs and an analysis of Facebook attacks

Here’s an overview of some of last week’s most interesting news: What’s in store for us in 2012 Looking forward into what lies ahead for us in 2012, Zscaler …

Week in review: Mobile application security risks, holiday-themed scams, and reasons for ditching Java

Here’s an overview of some of last week’s most interesting news and podcasts: Windows 8 will have picture password sign in As much as security experts would like …

Week in review: Multiple dimensions of corporate espionage, 2012 biggest security threats, and avoiding malware behind QR codes

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Rise of unencrypted cards 71 percent of merchants were found to store …

Week in review: Facebook bug gives access to private photos, zero-day exploited in ongoing attacks, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, articles and interviews: IT pros can’t resist peeking at privileged information IT security …

Don't miss

Cybersecurity news