Heartland to pay up to $60 million after data breach
Heartland Payment Systems and Visa announced a settlement agreement under which issuers of Visa-branded credit and debit cards will have an opportunity to obtain a recovery …
Date breaches: The insanity continues
In 2009, the Identity Theft Resource Center recorded 498 breaches, less than the 657 in 2008, more than the 446 in 2007. Are data breaches increasing or decreasing? That is …
How to use the JavaScript Blacklist Framework from Adobe
The video below shows you how to use the new JavaScript Blacklist Framework from Adobe to blacklist (vulnerable) API functions in JavaScript. For more information on PDF …
Self-encrypting disk drives for desktop and laptop computers
Mobile Armor announced the general availability of DriveArmor 3.0, a solution for access control and managing security on laptop and desktop computers with 2.5-inch …
IRS spam campaign delivers malware
The end-of-year holidays have come and gone, and holiday scams are for the moment put on hold as tax season is approaching. TrendLabs warn about the latest spamming campaign …
Job seekers targeted by online scams
It’s hard times for job seekers around the world, made even harder by the fact that they have been heavily targeted by those who don’t have qualms about taking …
Rogue software details: RapidAntivirus
RapidAntivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Rapid …
Pay by password
Verotel, an Internet Payment Service Provider that specializes in processing high-risk credit card payments, announced Verotel QuickCharge – a new tool for Internet …
Week in review: Identity theft, cybersecurity jobs, online fraud
Here’s an overview of some of last week’s most interesting news, interviews, reviews and articles: Privacy issues of data collecting Will 2010 see the beginning of …
Red Condor 7 supports TLS encryption
Red Condor released version 7.0 of its anti-spam software, which powers the company’s family of Message Assurance Gateway email security appliances and its hosted spam …
Privacy rights under attack
I think we can all agree about the fact that privacy has become an increasingly fluid concept with the advent of social networks. Yes, you can choose what you post, but your …
Aggressive phishing campaign spoofing Microsoft Office Outlook Web Access
An aggressive spear phishing email campaign inviting recipients to “apply a new set of settings” to their mailboxes because of a recent “security …