Web developer devises new phishing trick
A British web developer has devised a proof-of-concept phishing attack that could be way more successful than the standard fake login page with the wrong URL. Jack Shepherd …
Changes to the Java security model
The upcoming security changes in Oracle Java address three long-standing issues with the Java security model. The most significant change is how signed applets are handled. In …
U.S. judge orders Google to share user info with the FBI
Google has been ordered to comply with FBI requests for user information that came in the form of National Security Letters (NSLs) by U.S. District Court Judge Susan Illston. …
The rise of the Koobface social networking worm
A new McAfee Labs report shows a significant spike in instances of the Koobface social networking worm and a dramatic increase in spam. McAfee Labs also saw continued …
Google won’t allow facial recognition on Glass
Whether Google Glass ships out to regular users later this year or the next, one things is sure: it won’t make use of facial recognition software – for now. The …
LinkedIn unveils optional 2-step verification
“Professional” social networking website LinkedIn is the latest in a string of popular online services and communities that have introduced optional 2-step …
The enterprise security time bomb
Companies are at serious risk of data security breaches as 38 percent of U.S. office workers admit to storing work documents on personal cloud tools and services, according to …
Security software market grew 7.9% in 2012
Worldwide security software revenue totaled $19.2 billion in 2012, a 7.9 percent increase from 2011 revenue of $17.7 billion, according to Gartner, Inc. Gartner said that the …
Deloitte acquires Vigilant’s cyber security services business
Deloitte strengthened its cyber security capabilities today by acquiring substantially all of the assets of Vigilant, a specialist in security monitoring and cyber threat …
Beware of Android Defender mobile scareware
Scareware aimed at mobile users is not nearly as ubiquitous as that directed at those who use Windows-run PCs. Nevertheless, there is some out there. Sophos’ Paul …
Police and FBI must return seized materials to Kim Dotcom
New Zealand High Court Justice Helen Winkelmann has ordered the NZ police and the FBI to go through the digital material seized following the arrest of Megaupload founder Kim …
Becoming a computer forensic examiner
Since the advent of affordable personal computers, digital devices, and later the Internet, these technologies have been used for both legal and illegal purposes, and in order …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)