Hackers destroy pump in U.S. water utility attack
Hackers attacking SCADA systems and wreaking havoc in a nation’s critical infrastructure has become a justified concern for all countries. But, setting aside Iran and …
Cybercriminals to turn mobile phones into ATMs
With all of the crazy 2011 security breaches, exploits and notorious hacks, what can we expect for 2012? Researchers of the Websense Security Labs provide their top …
Most popular prohibited IT activities in the workplace
In spite of the fact that 74% of the interviewed IT professionals have already misused the company’s IT system, and could have lost their job, if a video recording could …
Backdoor Trojan pushed via versatile Facebook campaign
Thanks to its social nature, Facebook is one of the preferred tools of cyber crooks looking to scam users and peddle malware. Microsoft recently spotted a considerably …
Tips for secure mobile payments
With the increased use of mobile devices to pay for goods and services, traditional wallets with cash and credit cards could one day be obsolete. A new ISACA white paper …
Create a Wi-Fi hotspot anywhere
TP-LINK announced two new Portable Wireless N Routers, designed to provide high-speed Internet access anywhere you go. Both routers are ideal for connecting tablet computers, …
Solutions for inspecting and securing SSL traffic
Fidelis Security Systems announced the SSL Decoder within Fidelis XPS, which provides the ability to assess the authenticity of an SSL certificate. They also introduced the …
The future of cybersecurity in cars
As technology evolves at a seemingly breakneck speed, we must be aware of the fact that the environments in which we find ourselves every day – environments that have in …
Changing nature of DDoS attacks
The volume of packets-per-second (PPS) has almost quadrupled compared to Q3 2010, illustrating a significant increase in the size and diversity of DDoS attacks over the past …
DevilRobber Trojan returns, masquerades as PixelMator
DevilRobber, the latest Trojan to target Mac users, got updated. As you may remember, the previous incarnation stole Bitcoins from the user’s wallet file, used the …
Personal electronic signatures for everyone
DocuSign Ink helps consumers finish personal business faster by eliminating once and for all the hassles and costs of printing, faxing, scanning, and overnighting signed …
Change management leads to security breaches
75% of organizations believe their current change management processes could put them at risk of a security breach, according to Tufin. Having sampled 100 network security …