Pros and cons of biometric authentication
In theory, biometrics are a great way to authenticate a user: it’s impossible to lose your fingerprint (barring the most gruesome of developments), you can’t …
International Secure Systems Development Conference
The International Secure Systems Development Conference, taking place in London during May 2010, addresses the key issues around designing-in security for standard and …
The future doesn’t look bright for Google in China
Google’s announcement that it will leave China if the censoring of their search results continues seems not to have affected the Chinese government much. They have not …
How to avoid rogue security software
What can you do to help prevent the spread of rogues and make sure that rogue software vendors stop profiting from their unscrupulous business? Follow these tips below to tell …
Cryptome.org shut down for exposing MS surveillance guide
Cryptome, the whistleblower site that serves as a repository for “documents for publication that are prohibited by governments worldwide, in particular material on …
SEO poisoning reaches a new level
To improve the chances of installing their malware on random computers, scareware peddlers have decided to set up more that 60 websites that contain hundreds of possible …
Attackers focusing on capturing personal data
Online criminals are garnering greater success with increased technical sophistication affecting a wider range of industries. With greater diversity and the use of targeted …
Hackers follow the money, IBM research shows
Existing threats such as phishing and document format vulnerabilities have continued to expand, even as users improve security, according to a new IBM report. The X-Force …
Protect Mac applications against piracy and malicious attacks
As the Mac platform continues to gain popularity, attackers are increasingly exploiting weaknesses in Mac OS X applications to invade end-user systems. This exploitation leads …
Worm spreads on Fotolog social networking website
PandaLabs has reported the appearance of a new worm, FTLog.A, which spreads through the popular Fotolog social networking site. This foto-blogging portal is used by almost 30 …
End users are the main targets of online attacks
A report about the state of the Web by Zscaler indicates that cyber criminals have transferred the focus of their attacks from web and email servers to end user systems. Their …
Beware of the fake FBI fingerprint scanner
According to information popping up in some online forums, an application that supposedly allows you to enter and search the FBI fingerprint database will be released in a few …
Featured news
Resources
Don't miss
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation