4,500 USBs left at dry cleaners
A survey reveals that in the last year, 4500 memory sticks have been forgotten in people’s pockets as they take their clothes to be washed at the local dry cleaners. …
Google petitions for a EU security and privacy committee
As one of the reasons behind its practice of keeping users’ IP addresses and search histories Google mentions their use as tools for combating attacks such as the one …
Virus signature checksum risks
The notion of virus signatures is very easy for laymen to grasp if they stick to this analogy: anti-virus solutions detecting malware trying to pass itself as an innocuous …
FBI Director to chronicle the evolution of cyber threats at RSA Conference 2010
Robert Mueller, Director of the Federal Bureau of Investigation, will deliver a keynote address at RSA Conference 2010. Mueller’s keynote will detail cyber threats …
Rogue software details: ArmorDefender
ArmorDefender is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Three-factor authentication using voice biometrics
PhoneFactor announced biometric verification for its phone-based authentication platform. By leveraging an existing voice channel, the new offering simultaneously verifies …
Serious Mac OS X vulnerabilities patched
Apple released Security Update 2010-001 which improves the security of Mac OS X. CoreAudio A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously …
Foursome fleeing from cyber fraud charges arrested in Mexico
Fleeing to Mexico to avoid prosecution for conspiracy to commit wire and mail fraud, four Texans were arrested last Friday in Cancun. Web Host Industry Review reports that …
81% of organizations lack visibility into network traffic
According to a new research report by Enterprise Management Associates, insufficient network monitoring coverage is a pervasive and growing problem among enterprises, …
Is data stored “in the cloud” protected by the Fourth Amendment?
The implementation of cloud computing by companies and individuals is rising slowly, but steadily. There will always be people who are ready to bear the risk of a new way of …
Scammers aggressively targeting Haiti donations
A week after the devastating Haiti quake, scammers are working harder than ever to exploit the good will of people that want to help the victims by giving donations. The FBI …
D-Link routers vulnerability allows hackers to reconfigure admin settings
Recently, SourceSec Security Research announced on its blog that they have discovered a vulnerability in D-Link routers that allows outsiders and insiders to access and edit …
Featured news
Sponsored
Don't miss
- How a GRC consultant passed the CISSP exam in six weeks
- BLint: Open-source tool to check the security properties of your executables
- Tailoring responsible AI: Defining ethical guidelines for industry-specific use
- Are you meeting your cyber insurance requirements?
- Black Basta target orgs with new social engineering campaign