Is the Firefox 10 silent update feature a good thing?
Mozilla is planning to implement silent background updates in the upcoming version of Firefox 10, which could be very bad news on the security front, according to Philip …
Cybercrime statistics in Ireland
The Irish Reporting and Information Security Service (IRISSCERT) released statistics on cybercrime incidents it has dealt with so far in 2011. The statistics are based on all …
Ten cyber shopping tips
Safeguarding one’s online identity is even easier this holiday season with the addition of new mobile and iPad applications that allow you to check your balances while …
Turn smartphones into mobile security systems
StreetSafe is a mobile personal security system that combines wireless networks with GPS technologies and a safety network and database. “StreetSafe is accessible …
Alleged leaker Bradley Manning finally scheduled for court
After being held in custody for over 17 months, former Army intelligence analyst Bradley Manning will finally see the inside of a court as his Article 32 pretrial hearing is …
Another U.S. SCADA system compromised thanks to lousy security
After the news about a water utility company in Springfield, Illinois suffering a hack attack that ended in the destruction of a water pump broke on Friday, the U.S. …
The most vulnerable smartphones
Bit9 highlighted the most vulnerable popular smartphones in use today. The devices on the list pose the most serious security and privacy risk to consumers and corporations. …
Android officially the primary target for new mobile malware
The Android mobile operating system solidified its lead as the primary target for new mobile malware, according to McAfee. The amount of malware targeted at Android devices …
Facebook and Twitter users targeted with same scam
A Starbucks-themed scam has been spotted targeting users of both Facebook and Twitter users and it does so not via messages sent from compromised accounts, but through spam …
38,000 emails from U.S. special agent leaked by Anonymous
Law enforcement officers and white hats working for the government or for private companies contracted by the government are among the favorite targets of hacking collective …
IT security budgets set by U.S. federal agencies
A new IDC Government Insights report examines IT security budgets set by each U.S. federal agency and reveals how much each organization actually spends on security-focused …
Yet another Trojan based on Spitmo source code surfaces
Even though nearly all new mobile malware in Q3 was aimed at Android phones, users with mobile devices running other mobile platforms are far from safe. F-Secure researchers …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down