Travelers left 11,000 mobile devices at U.S. airports
Travelers left behind more than 11,000 laptops, tablet PCs, smartphones and USB sticks in airports in the United States during the past year. Credant was able to gather survey …
SquirrelMail multiple vulnerabilities
Multiple vulnerabilities have been reported in SquirrelMail, according to Secunia. These vulnerabilities can be exploited by malicious users to conduct script insertion …
Scammers lure users with fake Google+ invites
Google recently opened for business a social network named Google+, and to avoid making mistakes that plagued the rollout of its predecessor Google Buzz, the company has …
Spammers switch to compromised accounts, shift away from botnets
Spammers today favor compromised accounts for sending spam, gradually shifting distribution away from botnets, according to Commtouch. The changed tactic has emerged as spam …
Anonymous releases 90,000 military emails and passwords
Anonymous persists with its AntiSec campaign and the latest target to fall has been Booz Allen Hamilton, one of the biggest U.S. military contractors. According to the …
140,000 children could be identity fraud victims
For most people, the thought of their children being victims of identity fraud is even more chilling than being a victim themselves. While children are less at risk for …
Critical vulnerability in Sun Java
ACROS Security has discovered a vulnerability in Sun Java, which can be exploited by malicious people to compromise a user’s system, according to Secunia. The …
MS Security Center search results poisoned
You would think that the Microsoft Safety and Security Center is the one place where you would be safe from malicious links, and you would be wrong. According to GFI’s …
U.S. to consider a new, secure Internet
While Iran thinks about instituting a national Internet in order to minimize the “poisoning” of Iranian minds with Western ideas and culture, the U.S. is toying …
An examination of malware ecosystems
Malware delivery networks are typically hosted across multiple sites and are responsible for launching dynamic attacks on unsuspecting users. A new Blue Coat report examines …
U.S. government-funded labs targeted by cyber attacks
It’s safe to say that successful U.S. companies, government facilities and military contractors are by now to aware that they should always be on the lookout for cyber …
Can the Google .co.cc ban be effective?
Google has recently decided to block all pages hosted on the .co.cc domain from appearing in its search results, and the move has sparked discussions. The search giant has …