iOS and Android more secure than PCs?
While the most popular mobile platforms in use today were designed with security in mind, these provisions are not always sufficient to protect sensitive enterprise assets …
Solution for Popureb rootkit infection
Bootkits are kernel-mode rootkit variants that hide in the computer’s master boot record (MBR) and are notoriously difficult to spot and, sometimes, to eradicate. …
Gannett Government Media user information stolen
The Gannett Government Media family of websites suffered a cyber attack on resulting in unauthorized access to files containing user information. The information in those …
Hackers publish stolen PayPal login credentials
LulzSec has been assimilated back into Anonymous, but their AntiSec campaign keeps going. It seems that their final wish has been granted for now, and other hacking groups …
Thousands of Tumblr accounts compromised
Tumblr users have been targeted with an aggressive phishing campaign in the last week or so and are still being lured into entering their login credentials for access to adult …
Encrypted voice calling for the iPhone
Cellcrypt Mobile for iPhone provides voice call encryption for commercially available off-the-shelf cell phones using government-certified security through an easy-to-use …
Security vendor applauds LulzSec attacks
In an unexpected move for a security company, SecurEnvoy today said that cyber break-ins and advanced malware incidents, such as the recent DDoS attack by LulzSec, should …
Identity theft doesn’t take vacations
Identity theft is a real risk and one that is amplified during the summer months. Recent survey results indicated that, whether booking flights at home, logging on at a Wi-Fi …
Protect your computer and phone from illegal police searches
Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your home to search …
Spammers push cloned apps on Android Market
No stone is left unturned, no option unexplored when it comes to online spamming, and the latest approach has shown that malware authors are not the only ones who have taken …
LulzSec ends 50 days hacking streak, says goodbye
The LulzSec “boat” has sailed into the sunset after 50 days of “disrupting and exposing corporations, governments, often the general population itself, and …
Privacy and data breach solutions for healthcare
Today, data breach in healthcare is a surreptitious threat, with a data breach in healthcare occurring every two days. Complicated by federal and state governments regulating …
Featured news
Resources
Don't miss
- Why outsourcing cybersecurity is rising in the Adriatic region
- Microsoft rolls out Windows 11 “quick recovery” feature
- Maximum severity Cisco ISE vulnerabilities exploited by attackers
- Phishing campaign targets U.S. Department of Education’s G5 portal
- Cervantes: Open-source, collaborative platform for pentesters and red teams