Please turn on your JavaScript for this page to function normally.
What information security might look like in a decade

Esther Dyson, a former chair of the Electronic Frontier Foundation and the ICANN, and a long-time successful investor in IT start-ups, addressed on Sunday the crowd gathered …

Christmas spam starts early this year

It seems that retailers are not the only ones to have hurried up with getting advantage of Christmas as a magic, profit-enhancing word. Spammers are know for their heightened …

Facebook spamming practices revealed

Dennis Yu, the CEO of BlitzLocal, was a guest yesterday on TechCrunch, and he shared his thoughts and knowledge about Facebook spamming and advertising. BlitzLocal is an …

Convicted social networks “hacker” commits suicide

StudiVZ, a social network for students based in Berlin and the German answer to (and clone of) Facebook, has been hit by unpleasant news. TechCrunch Europe reports that the …

Woman fired as a result of error in FBI criminal database

Ages ago when I first saw “The Net”, an action thriller featuring Sandra Bullock as a computer expert whose life gets turned upside down by hackers who have access …

Facebook spammer has to pay big money

Facebook has won the court battle against Sanford Wallace, one of the spammers who obtained access to people’s accounts and used them to spam their friends. He is …

5 handy WordPress security plug-ins

WordPress is one of today’s most popular publishing platforms. Like any other system, it needs security. What follows is a list of 5 practical plug-ins that extend its …

DHS to open new cyber operations center

During a roundtable at RSA Conference Europe last week, Philip Reitinger, U.S. Department of Homeland Security (DHS) Deputy Under Secretary for the National Protection and …

Careless spammer reveals tricks of the trade

I guess it had to happen sooner or later. After looking at who knows how many spam-and-scam occurrences, Patrick Fitzgerald of Symantec has struck gold while investigating the …

A closer look at Acunetix Web Vulnerability Scanner 6.5

Web applications are accessible 24 hours a day, 7 days a week and control valuable data since they often have direct access to backend data such as customer databases. SSL and …

UK’s own “three-strikes” anti-piracy law announced

Following the decision of the European Parliament that enables European member states to approve laws that force ISPs to disconnect individuals from the Internet, the UK is …

Spear phishing scammers target Taiwan officials

TrendLabs reports that they have discovered several instances of “spear phishing”. Spear phishing is a specific type of phishing fraud that involves customizable …

Don't miss

Cybersecurity news