Please turn on your JavaScript for this page to function normally.
Identity theft protection tips

More than 11.6 million adults were victims of identity theft in 2011, according to Javelin Strategy & Research. Child identity theft is also a significant problem, which …

Week in review: Critical Flash update, Bamital botnet takedown, and children turning into malware developers

Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: Federated single sign-on to dominate by 2016 A well-executed …

Windows and OS X users under attack, update Flash now!

Adobe has pushed out an emergency Flash update that solves two critical vulnerabilities (CVE-2013-0633 and CVE-2013-0634) that are being actively exploited to target Windows …

Hacker compromises email accounts of Bush family members

A hacker by the online handle “Guccifer” has apparently managed to compromise email accounts belonging to the Bush family and some of their close friends, from …

Twitter users hit with typo-squatting phishing campaign

In the wake of last week’s compromise of 250,000 Twitter accounts comes another threat to Twitter users: phishing messages – both DMs and tweets – that lure …

Bogus cleaning apps on Google Play install backdoor on PCs

Malicious Android apps able to infect and set up a backdoor on PCs running pre-Windows 7 operating systems have been recently spotted by researchers of several security …

Children turning into malicious code developers

In a world filled with laptops, tablets and smartphones, today’s children become digitally fluent far earlier than previous generations. Now, AVG has found evidence that …

Five safety tips for Valentine’s Day

Whether you decide to give flowers, chocolates or something a little more unusual as the perfect symbol of your affection this Valentine’s Day, make sure you take extra …

PCI DSS cloud computing guidelines

The PCI Security Standards Council (PCI SSC) published the PCI DSS Cloud Computing Guidelines Information Supplement, a product of the Cloud Special Interest Group (SIG). …

Privacy and security incident management for healthcare

A lost laptop or lost paper files can put a healthcare organization in a tailspin, especially if they contain the protected health information (PHI) of thousands of patients. …

EU cybercop: European Cybercrime Centre to focus on criminal gangs

The European Cybercrime Centre (EC3) at Europol in The Hague aims to become the focal point in the EU’s fight against cybercrime, through building operational and …

Learn by doing: Phishing and other online tests

As a tech-savvy person in a family that mostly consists of low level Internet users – and especially because of my line of work – I’m often tasked with …

Don't miss

Cybersecurity news