4chan users take MPAA, RIAA websites down with DDoS attacks
The websites of the Motion Picture Association of America (MPAA) and Indian tech firm Aiplex Software were crashed by DDoS attacks yesterday. The architects and executors of …
Google rolls out 2-factor authentication for Gmail and Apps
In view of the ever increasing number of successful phishing attacks that leave users with compromised accounts, Google has announced the introduction of two-step verification …
Mobile fraud detection imperative for the future of mobile commerce
By year-end 2013, location information or profile information from mobile phones will be used to validate 90 percent of mobile transactions, and the rapid adoption of …
Cybercriminals steal Interpol Chief’s identity to access info on fugitives
Ronald Noble, Interpol’s Secretary General, has revealed that cybercriminals have opened two fake Facebook accounts using his name and used them to gather sensitive …
Testing tool for packet filtering and access control systems
Idappcom launched Traffic IQ V2.0, an automated auditing and vulnerability assessment testing tool that has an extensive traffic library that includes thousands of real …
Week in review: Smartphone security risks, botnet offering DDoS services, defense of the future Internet
Here’s an overview of some of last week’s most interesting news, interviews and articles: “Here you have” virus authors may be based in Spain …
BruCON planning halted by malware-infected aiport website
I was finalizing some details for my trip to BruCON next week and I stumbled upon a reported attack page on the official Charleroi Airport website: According to …
Seagate’s self-encrypting hard drive earns U.S. Government certification
Seagate’s Momentus Self-Encrypting Drive, the world’s first laptop hard drive with built-in encryption to protect against unauthorized access to information on …
80% of network attacks target web-based systems
2010 has brought the use of the Internet for conducting business to an all-time high; however, attacks continue to strike networks more than ever by using sophisticated …
Mobile tracking, remote phone locking and data wiping
Spare Backup launched Spare Mobile Security, a suite of software tools that provide users the means to remotely manage their mobile device. The suite includes five features: …
Facebook is the top source for malware infections
The use of social networking during working hours is common (77% of employees do), and consequently, 33% say they have been infected by malware corporate network that has been …
How bad are the web bad guys?
As the bad guys look for new ways to exploit holes in technology, they have become increasingly financially motivated, with organized crime picking up where the …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity