Tips for safer social networking
The popularity of social networking sites such as Facebook, Twitter and LinkedIn is continuing to grow dramatically, but not just with users. Cybercriminals increasingly are …
Android SMS Trojan delivered via SEO techniques
Android users searching for pornography on their smart phones could be in for a costly surprise. During the course of researching the origin for the first SMS Trojan for …
Apple iOS 4.1 fixes security issues
The iOS 4.1 Software Update is the first major update to iOS 4, bringing Game Center, new iTunes features, high dynamic range photography, and security updates to the iPhone. …
Security for Android applications
Arxan Technologies released EnsureIT for Android, a software protection product that secures mobile Android applications against reverse-engineering or tampering for …
Infiltrated SpyEye C&C server provides glimpse into botnet activity
A C&C server controlling a small botnet comprised of computers infected by SpyEye – the information/data stealer Trojan often called “ZeuS Killer” on …
Gmail phishing campaign is under way
Fake notices inviting Gmail users to update their Google account information have lately been hitting inboxes around the world, warns Sunbelt. Purportedly coming from the …
Trend Micro launches Titanium 2011 security software
Trend Micro released Titanium Security 2011 that utilizes a cloud-client strategy that combines cloud-based web, email, and file reputation services with Trend Micro’s …
NSA Director says citizens’ privacy will never be compromised
Cybersecurity and citizens’ privacy won’t be mutually exclusive terms for the federal government, vows NSA Director Gen. Keith Alexander. “As the director of …
International variations in online threat perception
How do computer users around the world view online security risks? A survey by F-Secure reveals some interesting international variations in people’s experiences and …
The emotional impact of cybercrime
A new study by Norton reveals the staggering prevalence of cybercrime: 65% of Internet users globally, and 73% of U.S. Web surfers have fallen victim to cybercrimes, including …
Safari 5.0.2 addresses three vulnerabilities
Safari 5.0.2 includes improvements to performance, stability, and security. A search path issue exists in Safari. When displaying the location of a downloaded file, Safari …
How black hat spam SEO works
For some time, attackers have leveraged Search Engine Optimization (SEO) techniques in order to promote malicious web content targeting end users. Google has researched this …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity