Week in review: Signs of computer infection, iPhone jailbreaking and Facebook mobile privacy
Here’s an overview of some of last week’s most interesting news and videos: Web 2.0 security in the workplace The use of social networking applications has …
Private browsing modes not as private as one might wish
The four most used web browsers – Internet Explorer, Firefox, Chrome and Safari – all have private browsing modes. Yes, they are designed to delete the most …
Rogue AV misuses VirusTotal’s name
Using well-known names and brands in order to elicit trust in potential victims is a tried-and-true technique used by online criminals, and this latest malware-pushing scheme …
Facebook virus hoax spreading rapidly
Sophos is advising Facebook users to think before passing on a virus warning that is rapidly spreading across the social network. A large number of users are currently …
Microsoft Exchange Server 2010 Best Practices
Apply best practices for administering Exchange Server 2010 and SP1 and optimize your operational efficiency. Microsoft Exchange Server 2010 Best Practices captures the …
Managed DNS Service integrate DNS, DHCP and IPAM
BlueCat Networks launched Proteus Cloud Services, a managed DNS service that provides control and central management of external DNS as well as enabling organizations to …
Facebook rolls out mobile privacy
Facebook is aware that users are becoming increasingly mobile, and to help them to change their privacy settings while on the go, privacy controls are now accessible from any …
Firefox 4.0 beta download scam on Twitter
A Twitter update hash-tagged “Firefox” spotted by Sunbelt offers a unique opportunity: follow the offered shortened link to download a cracked Mozilla Firefox 4.0 …
Fighting illegal content on the Internet
Detective Sergeant Michael Moran specializes in the domain of online child exploitation and in his address to the Institute, he focused on Interpol’s role in the fight …
How can I know if my computer is infected? 10 signs of infection
Users are often advised to use an antivirus to check if their systems are infected, but with the current cyber-crime scenario, this is simply not enough. Frequently, it takes …
ZeuS variants hide behind snatched certificates
Copying certificates from legitimate files and mimicking signatures from certificate authorities is certainly not a new tactic in the cybercriminals’ arsenal, but is one …
Remote monitoring tool for social networking activity
Awareness Technologies has expanded its WebWatcher monitoring tool for the social media platforms Facebook and MySpace. WebWatcher allows users to install the software and …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online