The impact of online shopping on corporate networks
With 88 percent of retailers offering aggressive online discounts on Cyber Monday, over 70 million Americans were expected to shop online from work. A survey from Ipswitch …
Mac forensics software gathers social networking evidence
MacForensicsLab Social Agent 1.0 is designed to get evidence from chats, private messages, and blog activity on Facebook (and other) social networking websites. Social Agent …
Exploit kit with integrated AV checker
The latest version of the relatively new “Siberia Exploits Kit” has an interesting feature that must make it pretty popular among criminals – a built in AV …
WikiLeaks and Assange under attack
While WikiLeaks’ site is still being bombarded with requests at a speed of 10 gigabits per second – making access to it very difficult and at moments even …
WordPress 3.0.2 hardens security
WordPress 3.0.2 is available and is a mandatory security update for all previous WordPress versions. This maintenance release fixes a moderate security issue that could allow …
Game teaches consumers about Internet security concerns
Trend Micro released Titanium Power Up, an online video game designed to challenge negative perceptions of Internet security with unexpected humor and personality. Titanium …
Deployments of HSPA+ and LTE networks will Impact communications in 2011
Deployments of HSPA+ and LTE networks will have a huge impact on all sectors of the communications industry next year, according to M/C Venture Partners. Mobile services will …
EventTracker 7.1 alerts users to security breaches
Prism Microsystems released EventTracker 7.1 with enhanced features including USB and writeable media monitoring. The proliferation of writeable media devices such as USB …
Amazon profiles abused by spammers and malware pushers
Experience has proven that if a site enables users to contribute content, this feature will be abused by those who want to push their own agenda – usually spammers. This …
Facebook’s recurring nuisance – the recycled scam
Every now and then, a new Facebook scam pops up that takes advantage of the users’ curiosity and lures them in by promising to allow them to view who has visited their …
Using social networks safely
Everyone uses social networks like Facebook, Twitter or LinkedIn. Although these fantastic sites do have their upside, they also open users up to more computer viruses and …
New book: Web Application Obfuscation
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take …
Featured news
Resources
Don't miss
- How service providers can turn cybersecurity into a scalable MRR engine
- Stop settling for check-the-box cybersecurity policies
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner