Beware of bogus Facebook account hack tool offer
If, for whatever reason, you wish to hack into someone else’s Facebook account, searching online for ways to do it will likely bring you grief. Take for example a …
Secure mail providers close up shop to prevent govt spying
Texas-based secure webmail service Lavabit has unexpectedly closed up shop on Thursday, and the explanation given by owner and operator Ladar Levison is as follows: I have …
Netwrix updates its configuration auditing software
Netwrix Corporation announced Netwrix Auditor 5.0, a configuration auditing solution for security, compliance and operations across the entire IT infrastructure. It provides …
Microsoft to release three critical fixes
The August 2013 Patch Tuesday advance notification includes a slightly higher volume of fixes than last month, but only 3 of 8 are critical, which is down from July’s 6 …
Reveton changes tack, relies on fake AV
When it comes to the infamous Reveton ransomware, cyber crooks are forever coming up with additional ways to bilk money from users: pairing it up with banking Trojans, playing …
Facebook rolls out Graph Search for English speaking users
Graph Search, the semantic search engine whose Beta version Facebook introduced in March 2013, has been made available for everybody who uses the US English language. The …
Linux banking Trojan offered for sale
Windows users are by far the most targeted ones by malware-wielding criminals, but that doesn’t mean that OS X and Linux users should feel impervious. In fact, RSA …
Chrome not the only browser that stores plain-text passwords
When choosing to import his Safari bookmarks and settings into Google’s Chrome browser, software developer Elliot Kember discovered that although it seemed like he could …
Security intelligence through configuration auditing
Modern systems have a multitude of configuration elements that, ideally, meet the IT business requirements of the organization. The danger of having poorly configured systems …
Compliance no longer main driver of security measures
The need to ensure compliance with regulations should no longer be the primary consideration of CIOs when planning IT risk and security measures. Gartner said compliance is an …
Silent Text for Android now on Google Play
Silent Text for Android is now available for download in the Google Play store. It allows you to have secure and encrypted peer-to-peer text conversations on your mobile …
Experienced employees more important than a rising security budget
Tripwire announced the results of a survey of 167 attendees at Black Hat USA 2013. Many of those surveyed – 44 percent – said that if they could change one thing …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous