Please turn on your JavaScript for this page to function normally.
Facebook tops the list of risky social networking sites

Social networks may represent one of the most common infection and data loss vectors today, but it’s patently obvious that they are here to stay. Looking at them from a …

Cloud computing not as safe as they want you to think

Cloud computing has been touted as the perfect solution for our increasingly mobile life-style – everything we need is always online and always accessible. The …

Congressional web sites defaced

Visitors of websites of some Congressional representatives and of a few committees were greeted on Wednesday evening by a short message with colorful language. The websites …

IE vulnerability offers your files to hackers

Jorge Luis Alvarez Medina, a security consultant working for Core Security, has discovered a string of vulnerabilities in Internet Explorer that make it possible for an …

Report warned about Google-like attacks

Could the attack on Google have been prevented or, at least, mitigated? The question arose when the existence of a report titled “Report on the Capability of the …

Facebook users alarmed by “Unnamed” application

A cleverly orchestrated campaign taking advantage of a “Unnamed app” that can be found in the Application Settings of some people’s Facebook account has been …

iPad SEO poisoning campaign leads to malware

Was there any doubt about the fact that cybercriminals would use THE hottest topic on the Internet at the moment to spread their malicious payloads? A SEO poisoning campaign …

E-passport flaw enables owner tracking

E-passports could be used to track their owners – British computer scientists warn. The Register reports that the possibility was revealed by Tom Chothia and Vitaliy …

The state of encryption in Europe

It is a well know fact that IT employees are a special breed. They may be seen as overly paranoid and sometimes very singleminded and demanding about the issue of security and …

Digital fingerprints to identify hackers

How can you retaliate against a cyber attacker if you don’t know who he is? As we have witnessed lately, attribution of an attack is quickly becoming one of the biggest …

Hackers prey on Google workers’ friends

It has been discovered that the hackers who mounted the attacks on Google, Adobe and other companies recently breached, have targeted friends of employees that had access to …

US oil industry targeted by cyber attacks

It seems that the high profile breaches of Google and Adobe have been just the latest target in the Chinese march through US networks. ExxonMobil, Marathon Oil and …

Don't miss

Cybersecurity news