11 Chrome flaws patched, browser ready to survive Pwn2Own contest?
In a bid to make Google Chrome more difficult to compromise during the Pwn2Own contest that will be held during the CanSecWest conference less than a week from today, Google …
Cybersecurity bill changes, US president not permitted to shut down the Internet
Six months ago, two bills regarding cybersecurity were introduced in the US senate and a lot of people objected to the possibility that the bills would allow the US president …
Should major ISPs join the fight against botnets?
The recent “de-peering” of the AS-Troyak ISP and its consequent struggle (and relative success) to reconnect to the Internet has put into the spotlight the tangled …
Facebook “password reset” scam hits inboxes
Yet another “password reset” scam has been hitting the inboxes of Facebook users lately, warns McAfee: The email contains a zipped file that supposedly contains …
Barclays under strong phishing shower
A highly productive phishing scam, with more than 180 messages sent in three minutes, hits a big chunk of the online segment of Barclays members Various people are wondering …
Malware through hardware still around
Following the security fiasco that was the shipping of a HTC Magic phone complete with pre-installed malware, one would think that Vodafone could come up with a better excuse …
Rogue software details: DoubleVaccine
DoubleVaccine is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
1 in 4 kids have tried hacking
Despite 78% agreeing that it is wrong, 1 in 4 of UK’s children have tried their hand at hacking into others’ Facebook accounts mostly by surreptitiously using the …
Malicious ads on email service lead to malware
If you haven’t yet disabled JavaScript on your browsers, it’s high time to do it. TrendLabs warns about malicious advertisements popping up for users visiting a …
Rogue software details: Antivirus 7
Antivirus 7 is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\Desktop\Antivirus7.lnk …
Feds on social networks: What can they do?
Should law enforcement agents be allowed to go “undercover” on social networks and collect information about the suspects? In the real, physical world, they …
20 critical Apple vulnerabilities to be revealed
Charlie Miller, the security researcher renowned for hacking Apple products during many a hacking competition, will be making public (at the CanSecWest security conference …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)