Please turn on your JavaScript for this page to function normally.
Breached companies are not entitled to anonymity

Does the recent decision by District Judge Douglas Woodlock – to unseal the identities of two companies (J.C. Penney and Wet Seal) whose customer data has been stolen by …

New Linksys wireless routers

Cisco unveiled a new line of Linksys wireless routers, designed to let its core audience of tech experts and enthusiasts take their home networking experience to the next …

Blackhat SEO techniques

The business of using blackhat Search Engine Optimization (SEO) techniques to impregnate legitimate sites has become a huge money-spinner for cybercriminals. Every day scores …

Researcher exploits PDF file without using a vulnerability

Didier Stevens, security researcher and expert on malicious PDF files, has succeeded in creating a proof-of-concept PDF file that uses the launch action triggered by the …

Social networking risks under little control

While social media is pervasive in organizations worldwide, usage has far outpaced controls, according to the latest study conducted by Palo Alto Networks. The degree of …

Beware targeted attacks around tax season

With the tax filing deadline less than three weeks away, we’re entering the busiest time of the tax season according to the IRS. Last year, almost 95 million people …

Root issues causing software vulnerabilities

A survey on software security assurance conducted during the Security B-Sides conference shows 50% of software companies say security is “always a concern.” More …

Korea becomes world’s biggest malware producer

Korea has taken over from the US as the world’s largest producer of Internet viruses, according to analysis of internet threats in March by Network Box. Korea now …

Microsoft releases out-of-cycle IE security patch

Microsoft released a cumulative security update which resolves nine privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most …

Malware spread fueled by fear of money loss

Cyber crooks have learned long ago that potential targets respond well to scare tactics, and this the kind of social engineering approach that two recent spam campaigns …

SEO poisoning campaign about Moscow subway explosions

Another SEO poisoning campaign has been started by conscienceless cyber criminals – this one takes advantage of the people’s interest in the news regarding the …

Break TrueCrypt hard drive encryption quickly

The latest version of Passware Kit Forensic has become the first commercially available software to break TrueCrypt hard drive encryption without applying a time-consuming …

Don't miss

Cybersecurity news