Please turn on your JavaScript for this page to function normally.
4,500 USBs left at dry cleaners

A survey reveals that in the last year, 4500 memory sticks have been forgotten in people’s pockets as they take their clothes to be washed at the local dry cleaners. …

Google petitions for a EU security and privacy committee

As one of the reasons behind its practice of keeping users’ IP addresses and search histories Google mentions their use as tools for combating attacks such as the one …

Virus signature checksum risks

The notion of virus signatures is very easy for laymen to grasp if they stick to this analogy: anti-virus solutions detecting malware trying to pass itself as an innocuous …

FBI Director to chronicle the evolution of cyber threats at RSA Conference 2010

Robert Mueller, Director of the Federal Bureau of Investigation, will deliver a keynote address at RSA Conference 2010. Mueller’s keynote will detail cyber threats …

Rogue software details: ArmorDefender

ArmorDefender is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Three-factor authentication using voice biometrics

PhoneFactor announced biometric verification for its phone-based authentication platform. By leveraging an existing voice channel, the new offering simultaneously verifies …

Serious Mac OS X vulnerabilities patched

Apple released Security Update 2010-001 which improves the security of Mac OS X. CoreAudio A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously …

Foursome fleeing from cyber fraud charges arrested in Mexico

Fleeing to Mexico to avoid prosecution for conspiracy to commit wire and mail fraud, four Texans were arrested last Friday in Cancun. Web Host Industry Review reports that …

81% of organizations lack visibility into network traffic

According to a new research report by Enterprise Management Associates, insufficient network monitoring coverage is a pervasive and growing problem among enterprises, …

Is data stored “in the cloud” protected by the Fourth Amendment?

The implementation of cloud computing by companies and individuals is rising slowly, but steadily. There will always be people who are ready to bear the risk of a new way of …

Scammers aggressively targeting Haiti donations

A week after the devastating Haiti quake, scammers are working harder than ever to exploit the good will of people that want to help the victims by giving donations. The FBI …

D-Link routers vulnerability allows hackers to reconfigure admin settings

Recently, SourceSec Security Research announced on its blog that they have discovered a vulnerability in D-Link routers that allows outsiders and insiders to access and edit …

Don't miss

Cybersecurity news