Please turn on your JavaScript for this page to function normally.
Managing your identity, secure access and online storage while protected by the cloud

Webroot announced Webroot Internet Security Complete, the company’s newest consumer offering that integrates cloud-based threat protection with identity management and …

APWG launches offline phishing education program

The Anti-phishing Working Group has contributed its expertise in online fraud to the Internal Revenue Service with the creation of a new consumer fax education initiative to …

OMG! Profile Spy targeting Facebook users

Facebook users are a curious lot, and one of the things that seemingly regularly piques their interest is the opportunity to see who views their profile. Posts that read …

U.K. seeks cyber experts, offers challenge and educational and job opportunities

It seems that the U.S. is not the only country with a severe shortage of cyber security experts – the U.K. is seeking them out as well. The BBC dubbed it a …

WoW players targeted with phishing emails

World of Warcraft players are once again targeted by a phishing scheme, says F-Secure. Emails purporting to come from Blizzard Entertainment – the creators of WoW …

Week in review: Adobe Reader sandbox, Stuxnet worm and a new 0-day Windows vulnerability

Here’s an overview of some of last week’s most interesting news, reviews, articles and videos: 10 steps for safe web surfing This is a good time for vacation-goers …

Georgian businesses targeted by identity thieves

A week ago, Colorado’s Secretary of State and the state’s Attorney General warned registered businesses that criminals are hijacking corporate names and brands in …

No more free bugs?

The recent announcements from Google and Mozilla that revealed their intent of paying up to $3,133.7 and $3,000 (respectively) for an eligible vulnerability discovered by …

Browser-enforced mitigation against CSRF

This is a video of a talk by Lieven Desmet and Philippe De Ryck at OWASP AppSec Research 2010.

Safari’s AutoFill reveals personal information

A feature of Apple’s Safari browser can be used by hackers to harvest personal information, says Jeremiah Grossman, founder and CTO of WhiteHat Security, in his recent …

Reporting of security breaches should be included in regular reports

Reports that a leading legal expert has called for the mandatory reporting of all data breaches to the UK Information Commissioner’s Office (ICO) – in order to …

Snort 2.8.6.1 released

Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …

Don't miss

Cybersecurity news