How can the author of an anonymous e-mail be identified?
When anonymous letters were written by hand, graphologists were called in to identify the likely author. In this day and age when most such mail is sent electronically, it may …
Multiple vulnerabilities in Google Chrome
Multiple vulnerabilities have been reported in Google Chorme, according to Secunia. Some have an unknown impact while others can be exploited by malicious people bypass …
Fraud losses drop on cards, cheques and online banking
New figures show that banking industry initiatives are successfully keeping the fraudsters away from customers’ cards and bank accounts. Fraud losses on UK cards, …
Apple updates Java for Mac OS X 10.5 and 10.6
The latest Java updates from Apple deliver improved reliability, security, and compatibility. Java for Mac OS X 10.5 Update 9 delivers improved compatibility, security, and …
Will IPv6 render blacklisting obsolete?
We are all aware that IP addresses have almost run out. Security experts are debating the pros and cons, but the sad fact is the migration towards IPv6 is inevitable. Now it …
Risks to address when contracting for cloud services
Gartner has identified four risky issues that CIOs and sourcing executives should be aware of when contracting for cloud services. “Cloud service providers will need to …
AV industry fails to cover the basics
NSS Labs released two test reports of endpoint protection products which reveal new shortcomings in these widely deployed products. They cover multi-vector attacks (malware …
New variant of SpyEye banking malware
Norman researchers identified an emerging variant of the SpyEye Trojan that targets specific online banking applications. SpyEye is a malware toolkit that has become …
The privacy impact of electronic health records
While patients trust their doctors to protect their information, 49 percent believe that EHRs will have a negative impact on the privacy of their PHI and health data, …
Microsoft patches four vulnerabilities in Windows and Office
Today Microsoft released three security bulletins: one is rated Critical and two are rated Important. The bulletins address four unique vulnerabilities in Microsoft Windows …
Student charged with operating grade fixing scheme
At first glance, a 19-year-old might seem like an unlikely criminal. A school’s salutatorian (a student that has the second-highest marks at graduation) with a 4.54 …
(IN)SECURE Magazine issue 29 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 29 has been released today. Table of contents …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains