The 12 scams of Christmas
‘Tis the season for consumers to spend more time online – shopping for gifts, looking for great holiday deals on new digital gadgets, e-planning family …
Cybercrime and Espionage
The authors, seasoned experts in the information security field with obvious intelligence insights, provide the readers with an interesting overview of the current biggest …
Global phishing trends and domain name use
A new survey by the Anti-Phishing Working Group (APWG) reveals that phishing attacks perpetrated against Chinese e-commerce and banking sites soared by 44 percent in the first …
Computershare insider loses USBs with stolen customer financial data
Computershare, one of the largest financial market services and technology providers in the world, has filed a suit with the Massachusetts District Court against former …
Angry Birds know where you live
75% of the public may be giving away their physical location when downloading smartphone applications, according to AdaptiveMobile. 69% of smartphone users are adamant that …
Browser bloat and privacy concerns
An increase in browser-based bloat and malware, and growing concern over online tracking technology, will top the technology trends in 2012, according to SlimWare Utilities. …
Mobile screen-spy software recreates passwords
When one types text messages, emails and login credentials on one’s virtual iPhone or Android keyboard, larger bubbles containing each character pop up for a second …
Carbonite privacy blunder results in spam
Popular online backup service Carbonite has made another privacy misstep. Computerworld blogger Richi Jennings, a self styled “anti-spam wonk”, has discovered that …
Americans will sue if personal data is compromised
Americans will go to great lengths to avoid identity theft, and many say they would take legal action against government or private organizations that compromise their …
Secure replacement for the Certificate Authority System
Convergence is a secure replacement for the Certificate Authority System. Rather than employing a traditionally hard-coded list of immutable CAs, Convergence allows you to …
Irresponsible IT disposal methods
Although data security is the primary concern when decommissioning IT equipment, only 61 per cent of companies currently data wipe all of their redundant computers, according …
180,000 Swedes at risk following password-hacking spree
Registered members of around 60 popular Swedish websites are in danger of having their stolen login credentials misused by cyber crooks in the wake of the biggest ever …
Featured news
Resources
Don't miss
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics
- How to use Hide My Email to protect your inbox from spam
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)
- DeepSeek’s popularity exploited by malware peddlers, scammers