Please turn on your JavaScript for this page to function normally.
SSCP Video Mentor

Yet another title in the Pearson's series for interactive learning that targets users set on obtaining security certifications, SSCP Video Mentor is a combination of DVD and …

FBI fails to decrypt suspect’s hard drives – after 12 months of trying

After 12 months of failed attempts to crack the encryption that protects information held on 5 hard drives that belong to a Brazilian banker suspected of money laundering, the …

Cisco’s access point migration mode leaves networks vulnerable

A feature of Cisco’s Aironet 1200 Series Access Point can be abused by hackers to gain access to a company network, claim researchers from Core Security Technologies. …

A closer look at East-Tec Eraser 2010

East-Tec Eraser 2010 (v. 9.7) protects your privacy, identity and confidential information while removing all evidence of your computer and online activity. It erases your …

New site for Google’s encrypted search

When Google unveiled the option of encrypted use of its search engine, people were mostly satisfied. But schools and other educational institutions had a problem with this new …

Cyber criminals steal almost $400,000 using a Trojan

A few months ago, a small escrow firm from California was targeted by cyber criminals that managed to transfer almost $400,000 from the firm’s bank account to a number …

YouTube used to peddle a Facebook password stealer

As chance would have it, today is the day when we shine the spotlight on YouTube being used to peddle malicious software. First, we had the showcasing of the capabilities of a …

The longevity of computer worms

Viruses, Trojans, worms. They all enjoy a (sometimes brief, sometimes long) period within which the are at the peak of their game – so to speak – but that period …

YouTube used to showcase DDoS software

Legitimate businesses use all that the Internet offers to make their sales go up. And even though the use of social media tools can affect office productivity and be an entry …

Eminem death video leads to malware

The death of a world-famous celebrity is always top news, and it’s regularly exploited by cyber criminals to spread their malicious payloads. I would venture to guess …

iPad phishing scams still going strong

iPad’s instant popularity is – by now – the stuff of legends, and the possibility of receiving it as a reward for being a BETA tester, participating in a …

Carder forum hack reveals information that can be used to track down members

It’s every forum for itself in the cut-throat market of carder forums, and a security breach affecting one of them means more market share for the rest. It is, …

Don't miss

Cybersecurity news