Hiding from Google
Worried about Google tracking your online activity? Not satisfied with Tor’s speed? A (partial) solution to your problem has been set up by Moxie Marlinspike, a hacker …
Networks Solutions breached, hundreds of sites defaced
Network Solutions, the well-known U.S. hosting provider and domain registrar that manages over 6.6 million domain names, confirmed on Tuesday that their servers have been …
4,500 USBs left at dry cleaners
A survey reveals that in the last year, 4500 memory sticks have been forgotten in people’s pockets as they take their clothes to be washed at the local dry cleaners. …
Google petitions for a EU security and privacy committee
As one of the reasons behind its practice of keeping users’ IP addresses and search histories Google mentions their use as tools for combating attacks such as the one …
Virus signature checksum risks
The notion of virus signatures is very easy for laymen to grasp if they stick to this analogy: anti-virus solutions detecting malware trying to pass itself as an innocuous …
FBI Director to chronicle the evolution of cyber threats at RSA Conference 2010
Robert Mueller, Director of the Federal Bureau of Investigation, will deliver a keynote address at RSA Conference 2010. Mueller’s keynote will detail cyber threats …
Rogue software details: ArmorDefender
ArmorDefender is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Three-factor authentication using voice biometrics
PhoneFactor announced biometric verification for its phone-based authentication platform. By leveraging an existing voice channel, the new offering simultaneously verifies …
Serious Mac OS X vulnerabilities patched
Apple released Security Update 2010-001 which improves the security of Mac OS X. CoreAudio A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously …
Foursome fleeing from cyber fraud charges arrested in Mexico
Fleeing to Mexico to avoid prosecution for conspiracy to commit wire and mail fraud, four Texans were arrested last Friday in Cancun. Web Host Industry Review reports that …
81% of organizations lack visibility into network traffic
According to a new research report by Enterprise Management Associates, insufficient network monitoring coverage is a pervasive and growing problem among enterprises, …
Is data stored “in the cloud” protected by the Fourth Amendment?
The implementation of cloud computing by companies and individuals is rising slowly, but steadily. There will always be people who are ready to bear the risk of a new way of …
Featured news
Resources
Don't miss
- The messy data trails of telehealth are becoming a security nightmare
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way