Employees admit they would steal data when leaving a job
Employees openly admit they would take company data, including customer data and product plans, when leaving a job, according to Harris Interactive. The online survey probed …
DDoS threat spam targets domain owners
An interesting and not that often seen approach to make users part with their hard-earned cash has been spotted recently by Symantec. In the email in question, the spammer …
Facebook clickjacking scam tries to rip off users
If you happen to see a post on your friends’ Facebook pages about “Top 10 Funny T-Shirt Fails ROFL”, don’t fall for it. It’s just another scheme …
Over 200 websites use Justin Bieber as bait to distribute malware
PandaLabs detected more than 200 spoof Web addresses using the name of Justin Bieber as bait to lure users. By including the name of this popular singer in malicious links, …
WhatWeb: Fingerprint Web servers and applications
WhatWeb allows you to identify content management systems, blogging platforms, stats/analytics packages, javascript libraries, servers and more. When you visit a website in …
Millions of ColdFusion users still at serious risk
Millions of users of Adobe’s ColdFusion programming language are still at risk of losing control of their applications and websites. Out of the twenty two corporate …
Facebook Hacker: A dangerous tool
Phishing is known to be the weapon of choice for all cybercriminals that are after login credentials. However, a new attack tool – Facebook Hacker – has drawn …
Stolen flash drive with sensitive financial info
Another example that demonstrates the need to follow security policy when it comes to keeping personal and financial information handled by businesses and organizations secure …
Android game hides spying application
If you have a game called Tap Snake on your Android handset and you weren’t the one who installed it, you are probably getting spied on by someone who had physical …
Secure remote access for Mac users
HOB launched MacGate, a new secure remote access solution designed specifically for Mac users. It provides users with access to computers running Mac, especially graphics …
7-character passwords soon to be hopelessly inadequate
The increasing processing power and the growing number of processors on graphic cards will soon make 7-character passwords “hopelessly inadequate” to withstand …
HP to acquire Fortify Software
HP and Fortify Software have entered into a definitive agreement under which HP will acquire Fortify Software. Terms of the deal were not disclosed. With the acquisition of …
Featured news
Sponsored
Don't miss
- US exposes scheme enabling North Korean IT workers to bypass sanctions
- The importance of access controls in incident response
- Organizations struggle to defend against ransomware
- Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)
- Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)