Please turn on your JavaScript for this page to function normally.
Cracking encrypted iPhone backups

iTunes routinely makes backups of iPhones and iPods being synced to it. Such backups contain a plethora of information, essentially all user-generated data from the device in …

Top 10 malware threats for January

Sunbelt Software announced the top 10 most prevalent malware threats of January 2010. The top seven detections were the same as December, but in a slightly different order. In …

Entrust placed in leaders quadrant for Web fraud detection

Entrust has been positioned in the leaders quadrant of Gartner’s 2010 Magic Quadrant for Web Fraud Detection. Gartner’s Magic Quadrant for Web Fraud Detection …

The value of stolen credentials

The rapid evolution of Web 2.0 services and the parallel world of cybercrime is driving a revolution in the price that criminals charge each other for user credentials. The …

iPhone OS 3.1.3 patches security issues

iPhone OS 3.1.3 deals with several security issues outlined below. CoreAudio A buffer overflow exists in the handling of mp4 audio files. Playing a maliciously crafted mp4 …

(IN)SECURE Magazine issue 24 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 24 has been released today. Table of contents …

The truth about identity theft

Over the past five years, identity theft has become a growing, nationwide concern annually affecting approximately 10 million Americans. It’s an issue that is difficult …

Using social networks inadvisable without proper protection

While the advantages of social networks are obvious after a short period of use, the risks resulting from them are generally disregarded by their users, according to …

73% share online banking password

The vast majority of online banking customers reuse their login credentials to access non-financial and much less secure websites. Trusteer found that 73 percent of bank …

XSS vulnerability in Cisco Security Tools

Core Security issued an advisory disclosing a vulnerability that could affect large numbers of organizations using Cisco’s Secure Desktop security package and leave …

U.S. strategy for cyberwar and cyberterrorism

The Cyber Secure Institute published a whitepaper by Gen. Eugene Habiger USAF (ret.). who formerly served as Commander in Chief of United States Strategic Command. He also …

Man gets serious jail time for identity theft scheme

Martel T. Kirkland was sentenced today to 15 years in prison for conspiracy, mail fraud, aggravated identity theft, credit card fraud, wire fraud, uttering a forged security, …

Don't miss

Cybersecurity news