Please turn on your JavaScript for this page to function normally.
A closer look at Watchmac

Watchmac (v.1.6) is a handy piece of software that will tell you if someone has fiddled with your laptop while you were gone – moved it, removed its battery or unplugged …

Fabric weaves security into program code

Wouldn’t it be wonderful if we could build security into a program as it is written? This idea spurred a number of researchers from Cornell University to try and develop …

Twitter phish targets users with huge following

A link that will supposedly take users to a page where they can use a “mobile” version of Twitter has been popping up here and there in a number of chatrooms over …

Apple resolves FaceTime security flaw

A flaw in the beta version of Apple’s FaceTime for Mac which was presented on Wednesday, has apparently allowed potential hackers to gain access to and modify a …

Firefox extension makes social network ID spoofing trivial

A simple-to-use Firefox plugin presented yesterday at Toorcon in San Diego has hit the security world with the realization that squabbles about Facebook’s changing …

MySpace apps send user IDs to advertisers

In the wake of the discovery that some third party Facebook applications transmit users’ ID to ad agencies and Internet tracking companies, The Wall Street Journal has …

A “private” banking Trojan competes with ZeuS

The recent surge of brand new banking Trojans continues to give us more things to worry about. The latest one is named “Feodo”, and it has been around for months …

Facebook works on solution to stop inadvertent user ID sharing

The recent discovery that various third-party application on Facebook were sending users’ ID numbers and/or names to advertising agencies every time the users click on …

Fake MS Security Essentials peddles rogue AV products

I was wondering when will rogue AV peddlers start using the name of a real AV product, and now I have my answer. F-Secure has detected one called Microsoft Security Essentials …

Fake Stuxnet removal tool wreaks havoc

The Stuxtnet Trojan hit the headlines pretty hard, and people around the world feared that their system was compromised, too. Among the legitimate Stuxnet removal tools that …

Sensitive prisoner data found discarded in dumpster

When a homeless couple went searching for recyclable things in a gas station dumpster in California last week, they probably didn’t expect to find files containing …

Pentagon to aid DHS in case of cyber attack on domestic soil

It is a well know fact that the U.S. Department of Defense is forbidden to deploy military units within the nation’s boarders for law enforcement purposes. The only …

Don't miss

Cybersecurity news