Google extends SSL to developer facing APIs
Firesheep‘s authors can be the satisfied with the gradual migration towards SSL that most of the biggest social networks, search engines, online shops and others have …
Low-tech approach to ATM heist
ATM thieves in San Francisco have adopted an unusual and very low-tech way of getting their hands on some money. According to The SF Examiner, they simply glue down the …
The crucial role of crypto technologies
Crypto technologies play a crucial role in data protection and compliance activities across a wide range of industry sectors, in both private and public organizations, …
Phishing HTML attachments bypass browser detection
In the constant war that goes on between online crooks and scammers and security professionals, adaptability is a quality greatly prized by all. All of them are tied together …
Japanese “miracle survival” Youtube scam clips
Online scams taking advantage of the ongoing Japanese tragedy are popping up daily. The latest one spotted is perpetuated on YouTube, where users go to search for videos that …
5 tips to avoid Japan earthquake and tsunami scams
Unfortunately many cyber crooks are exploiting the tragedy in Japan to get money for unsuspecting surfers. Here are tips from Enigma Software to make sure you don’t …
Battling with manual firewall analysis
In a survey by Skybox Security, 42% of respondents had more than 100 firewalls to manage, and 67% said they have firewalls from multiple vendors. In fact, 54% said their firm …
GFI WebMonitor 2011 released
GFI Software launched GFI WebMonitor 2011, a web filtering and Internet monitoring software that helps to boost employee productivity by giving administrators the ability to …
Twitter spambots advertise “Radiation health” e-book
The earthquake/tsunami/nuclear reactor explosion situation in Japan is currently being exploited by cyber scammers in a great variety of ways, but among the things that I …
73,000 malware strains created daily in 2011
The number of threats in circulation has risen in comparison to last year. In the first three months of 2011, PandaLabs identified an average of 73,000 new malware strains, …
Securing your network from malware
One of the most significant threats to the security of your network, and the leading cause of data loss, is malware. Whether that malware comes in the form of a worm probing …
Etsy privacy changes leave a lot to be desired
The Internet was all abuzz yesterday about Etsy’s privacy snafu that made its buyer’s full names and purchase histories available for everyone to see. Anyone who …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance