Please turn on your JavaScript for this page to function normally.
Week in review: Flaw-ridden smartphones, Facebook app verification and malware-writing researchers

Here’s an overview of some of last week’s most interesting news and articles: Critical vulnerabilities in Photoshop CS4 Critical vulnerabilities have been …

iPad phishing scheme advertised on Facebook

How would you like to get one of the much-anticipated iPad gizmos in exchange of simply filling up a mere survey? Well, the offer sounds pretty good – in fact, it sounds …

Laptop theft exposes private info of AvMed Health Plans’ customers

Current and former AvMed Health Plans members’ personal information may have been affected by the theft of laptop computers from the company’s offices. In December …

Top 5 FIFA World Cup online risks

Lavasoft warned computer users to be aware of stealthy online traps set by cybercriminals to leverage public interest surrounding the 2010 FIFA World Cup – and issued …

Instant messenger phishing made simple

An Internet application “comes to the rescue” of MSN & YIM users who want to find out if their friends, colleagues or acquaintances have blacklisted them. It …

Rogue software details: Security Master AV

Security Master AV is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Virtualized mobile computing on a secure flash drive

Absolute Identification and Kanguru Solutions released their collaborative product, the RocIT Defender Elite; a secure, pocket-sized virtualized mobile computing platform …

Steady increase of generic malware

Sunbelt Software announced the top 10 most prevalent malware threats for the month of May 2010. Eight of the top 10 detections for May are reflecting the trend toward …

Panda Cloud Antivirus upgraded and expanded

Panda Cloud Antivirus has been upgraded and expanded. The upgrade of the Free Edition improves and extends the protection provided by the original free product, and the Pro …

HMRC breach recommendations being ignored

24 months since the publication of the Poynter report which was commissioned after the HMRC breach, and almost three years since the original misplaced discs came to light, …

zPOD puts your PC in your pocket

Zinstall announced zPOD, a privacy-enhanced mobile computing appliance which lets users instantly use their complete familiar environment on any available computer. zPOD …

What’s privacy got to do with it?

The news has been rife over the last few weeks with stories of privacy breaches by names we trust and use on daily basis. First it was Google. The corporation with the most …

Don't miss

Cybersecurity news