Please turn on your JavaScript for this page to function normally.
Research shows that identity fraud is in decline

The 2008 Identity Fraud Survey Report – released by Javelin Strategy & Research – confirms that identity fraud is declining in most parts of the United …

Report: Web browsers under siege from organised crime

IBM today released the findings of the 2007 X-Force Security report, detailing a disturbing rise in the sophistication of attacks by criminals on Web browsers worldwide. …

Apple released security update 2008-001

The fresh security update addresses the following: Directory Services – A local user may be able to execute arbitrary code with system privileges. A stack buffer …

500 Gbps firewalling performance

Clavister AB, provider of IP-based security and UTM solutions, today declared a new world record in network security throughput. Tests show that the new Clavister technology …

Research reveals majority of consumers concerned over mobile safety

McAfee announced findings from new research that reveals that almost three out of four mobile consumers (72%) are concerned about the security of today’s and …

Local root exploit on openSUSE 10.2/10.3

Marcus Meissner from the SUSE security team sent the following to the opensuse-security-announce mailing list: As you are undoubtly aware a new local root exploit has been …

P2P file sharing may be 2008’s greatest identity theft threat

According to the Identity Theft Assistance Center, a national non-profit coalition dedicated to protecting consumers from identity theft, throughout 2008 “criminals will …

PCI PED equipment approval listings and security requirements

The PCI Security Standards Council announced that PCI PED equipment approval listings and security requirements documents are available on the Council’s website. With …

Undercover: Authentication Usable in Front of Prying Eyes

Abstract from the whitepaper by authors Hirokazu Sasamoto, Nicolas Christin and Eiji Hayashi: A number of recent scams and security attacks hinge on a crook’s ability to …

Google spoofing worm and other malware of the week

Percoban.A reaches computers disguised as a Word file. When run, it makes a copy of itself with names such as Rahasiamu.exe or Jangan Dibuka.exe. It also creates a Windows …

New version of TrueCrypt free open-source disk encryption software

There is a new version of TrueCrypt, a free open-source disk encryption software for Windows Vista/XP , Mac OS X, and Linux. New features in version 5.0 include:Ability to …

New book: “Apache Cookbook 2nd Edition”

The new “Apache Cookbook” is a collection of recipes drawn from the fire hose of the Usenet newsgroups, the ApacheFAQ, Apache-related mailing lists, emailed how-to …

Don't miss

Cybersecurity news