Please turn on your JavaScript for this page to function normally.
Twitter “wrong credential combination” phishing scheme

If you have followed a link on a Twitter message from a contact that says “You have to be the first to see these new pictures!! LINK” and entered you username and …

Are computer “health certificates” the answer for the botnet problem?

Back in March, at the RSA Conference in San Francisco, Corporate Vice President for Trustworthy Computing at Microsoft Scott Charney proposed to the audience and to the world …

Infamous Canadian Pharmacy spam affiliate program shuts down

When it comes to spam, we’re all used to rising numbers – and the rising annoyance. But it seems that there could finally a reason to rejoice: it looks like …

A phishing e-mail to learn from

A phishing attempt that makes even people who are very good at spotting them pause for a moment and take a good look is a perfect example on which to learn. Ravi Dehar of …

A Guide to Kernel Exploitation

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers …

The importance of e-mail security

E-mail is exposed at various points along its transmission, via backups, by IT staff members, or during firewall inspection. And not just the text: attachments account for …

Facebook privacy changes – a missed opportunity?

Facebook announced yesterday that changes are coming soon to the Facebook interface, in particular to the ‘Groups’ system. According to CEO Mark Zuckerberg, …

The threat behind fake LinkedIn messages

Retarus sent out a warning in response to a current wave of fake contact requests via the social media platform LinkedIn. These well-simulated e-mail messages present a …

Guide helps enterprises design and implement key controls

Recent international regulations have placed the need for monitoring internal controls at the top of the boardroom agenda. Having controls in place is a basic business …

High expectations for personal information protection

According to a recent survey by ING, nine in 10 adults agree that financial services companies should be doing more to protect their customers’ personal and financial …

Navigation and fingerprint authentication device

AuthenTec unveiled today the world’s smallest fingerprint sensor for combining authentication and navigation functions in one device, the AES850. This low profile sensor …

Web-voting option suspended due to a system flaw

The option of casting your vote through the new D.C.’s Digital Vote by Mail system has been suspended because of a vulnerability that allowed a public tester of the …

Don't miss

Cybersecurity news