Net neutrality soon to be on EU’s agenda
Lack of regulation has contributed much to the success of the Internet, and made it a hotbed for new ideas. But there are some things that should be regulated and enforced in …
Apple releases OS X 10.8.4
The OS X Mountain Lion 10.8.4 Update is recommended for all OS X Mountain Lion users and includes features and fixes that improve the stability, compatibility, and security of …
Damballa now detects malicious P2P communications
Damballa Failsafe can now discover malicious P2P communications. It uses behavioral detection techniques to identify malicious P2P communication attempts from malware trying …
Online password manager for business
Zoho launched Zoho Vault, the secure online password manager for teams and businesses. It establishes a central repository that offers unmatched security and complete data …
Solution for Active Directory-based single sign-on
Centrify announced Centrify for Office 365, a solution for Active Directory-based single sign-on, user provisioning and mobile management for Office 365. The Azure-based …
Managed services for web, cloud and mobile app security
Cenzic has expanded its Cenzic Managed Services for Enterprise Application Security which now includes four levels of service including a special compliance-ready assessment …
FBI warns car buyers against scammy online deals
If you are looking to buy a car or other vehicle online, be careful not to fall for a scam that has lately had a resurgence and that will leave you without money and possibly …
E-voting system used in French election is flawed
A recent electronic election in France has proved electronic some voting systems still cannot be trusted not to include fraudulent votes. The town hall primary election which …
Web developer devises new phishing trick
A British web developer has devised a proof-of-concept phishing attack that could be way more successful than the standard fake login page with the wrong URL. Jack Shepherd …
Changes to the Java security model
The upcoming security changes in Oracle Java address three long-standing issues with the Java security model. The most significant change is how signed applets are handled. In …
U.S. judge orders Google to share user info with the FBI
Google has been ordered to comply with FBI requests for user information that came in the form of National Security Letters (NSLs) by U.S. District Court Judge Susan Illston. …
The rise of the Koobface social networking worm
A new McAfee Labs report shows a significant spike in instances of the Koobface social networking worm and a dramatic increase in spam. McAfee Labs also saw continued …