Identity theft protection tips
More than 11.6 million adults were victims of identity theft in 2011, according to Javelin Strategy & Research. Child identity theft is also a significant problem, which …
Week in review: Critical Flash update, Bamital botnet takedown, and children turning into malware developers
Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: Federated single sign-on to dominate by 2016 A well-executed …
Windows and OS X users under attack, update Flash now!
Adobe has pushed out an emergency Flash update that solves two critical vulnerabilities (CVE-2013-0633 and CVE-2013-0634) that are being actively exploited to target Windows …
Hacker compromises email accounts of Bush family members
A hacker by the online handle “Guccifer” has apparently managed to compromise email accounts belonging to the Bush family and some of their close friends, from …
Twitter users hit with typo-squatting phishing campaign
In the wake of last week’s compromise of 250,000 Twitter accounts comes another threat to Twitter users: phishing messages – both DMs and tweets – that lure …
Bogus cleaning apps on Google Play install backdoor on PCs
Malicious Android apps able to infect and set up a backdoor on PCs running pre-Windows 7 operating systems have been recently spotted by researchers of several security …
Children turning into malicious code developers
In a world filled with laptops, tablets and smartphones, today’s children become digitally fluent far earlier than previous generations. Now, AVG has found evidence that …
Five safety tips for Valentine’s Day
Whether you decide to give flowers, chocolates or something a little more unusual as the perfect symbol of your affection this Valentine’s Day, make sure you take extra …
PCI DSS cloud computing guidelines
The PCI Security Standards Council (PCI SSC) published the PCI DSS Cloud Computing Guidelines Information Supplement, a product of the Cloud Special Interest Group (SIG). …
Privacy and security incident management for healthcare
A lost laptop or lost paper files can put a healthcare organization in a tailspin, especially if they contain the protected health information (PHI) of thousands of patients. …
EU cybercop: European Cybercrime Centre to focus on criminal gangs
The European Cybercrime Centre (EC3) at Europol in The Hague aims to become the focal point in the EU’s fight against cybercrime, through building operational and …
Learn by doing: Phishing and other online tests
As a tech-savvy person in a family that mostly consists of low level Internet users – and especially because of my line of work – I’m often tasked with …
Featured news
Sponsored
Don't miss
- Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
- How passkeys eliminate password management headaches
- Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?
- IntelOwl: Open-source threat intelligence management
- Current attacks, targets, and other threat landscape trends