Please turn on your JavaScript for this page to function normally.
Identity thief admits stealing $770,000

A Brooklyn, N.Y., man pleaded guilty for his role in managing a credit card fraud operation that operated throughout the East Coast of the United States. Jonathan Oliveras, …

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the …

Adobe patches multiple products

Today, Adobe released the following Security Bulletins: APSB11-19 – Security update available for Adobe Shockwave Player (Critical) APSB11-20 – Security update …

P25 security mitigation guide

In a recent research paper [pdf], we analyzed the security features of the APCO Project 25 (P25) digital two-way radio system. P25 radios are widely deployed in the United …

Bitdefender Mobile Security for Android now with live tracking anti-theft feature

Bitdefender added two major new features to its free Mobile Security for Android Beta. The new anti-theft function allows users to easily track where their device is and to …

Panasonic Toughbook S10 comes with security features

Panasonic announced the Toughbook S10. Powered by an Intel Core i5-2520M vPro processor, it delivers up to 12.5 hours of standard battery life and weighs only 3.0 pounds. The …

A look into Black Hat’s wireless network

Aruba Networks, which provided and maintained the wireless network for last week’s Black Hat USA 2011 conference, today provided some interesting statistics around the …

Half of organizations lost information on USB drives

Inexpensive consumer USB Flash drives are ubiquitous in all manner of enterprise and government environments – typically with very little oversight or controls, even in …

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare explores the battlefields, participants and the tools and techniques used during today’s digital conflicts. The concepts discussed in this book will give …

Microsoft releases 13 security bulletins, fixes 22 vulnerabilities

Today Microsoft released 13 security bulletins, two rated Critical, nine Important and two Moderate. These bulletins address 22 unique vulnerabilities in Internet Explorer, …

FBI officials become spam targets

Various government agencies and high ranking government officials have been the target of previous spam attacks. In their attempts to lure victims, criminals continue to …

Social networking users becoming privacy aware

A vast majority of computer users do not post vacation memories via social networks, according to a recent survey by Avira. During a June 2011 survey of its customers, …

Don't miss

Cybersecurity news