Cyber-liability: Importance and complexity
When the U.S. Supreme Court agreed to take the case of a California police officer who sent sexually explicit text messages on a department-issued pager, news reports …
Mac video surveillance
SecuritySpy is a multi-camera video surveillance application for the Mac. It will enable you to set up a comprehensive surveillance system quickly. The motion detection …
Rogue software details: XPPoliceAntivirus
XPPoliceAntivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\XP …
Modification risks from portable devices
Software crackers are likely to continue modifying relatively low-cost specific-application devices, such as e-readers, but that the potential security risks to companies are …
Splunk 4.0.8 released
Splunk released version 4.0.8 of the Splunk IT search and analysis engine. General issues When you save a top or rare search with the argument showperc, the showperc argument …
The Pentagon waiting for its computer networks defense command
The Pentagon had planned to launch a cyber command that would be responsible for defending its global network of computer systems on October 1, following it by the appointment …
Top 10 application security trends
The Denim Group has announced its guidance on the top application security trends for 2010. 1. Web mashup applications will result in new attack vectors Web applications …
Secure encrypted ruggedized mobile hard drive
Rocstore announced its new line of Rocsecure Commander 2 encrypted external hard drives. The first of its kind in ruggedized design, the Commander 2 series pocket drives are …
25 million new malware strains in one year
The outstanding trend of the last 12 months has been the prolific production of new malware: 25 million new strains were created in just one year, compared to a combined total …
Twitter and Google account vulnerabilities
Nir Goldshlager, a security researcher and penetration tester, discovered some XSS vulnerabilities in Twitter and Google Calendar that can be exploited by attackers to steal …
Criminal found through World of Warcraft
It seems that law enforcement agencies are getting more creative with ways of leveraging dug up information about wanted criminals. Using the knowledge of a previously …
iPhone network sniffer
Pirni is the worlds first native network sniffer for iPhone. The iPhone’s Wi-Fi has some major drawbacks in its hardware design, thus we can not properly set the device …
Featured news
Resources
Don't miss
- Researchers unearth keyloggers on Outlook login pages
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps