Please turn on your JavaScript for this page to function normally.
Anti-theft Wi-Fi tag for laptops and tablets

Ekahau launched its newest Wi-Fi tag, the L4 Laptop tag. The L4 tag is a small flat unit designed to be plugged into the ExpressCard slot. The tag works with the Ekahau RTLS …

Multi-platform backdoor served through compromised website

The compromised website of a Colombian transport company has been found serving a signed Java applet that detects whether the visitor is using a Windows, OS X or Linux machine …

US-based machines preferred by malicious pay-per-install networks

Pay-per-install affiliate networks looking for compromised computers to get their malicious wares installed on have a definitive predilection for machines located in developed …

CompTIA Security+ Rapid Review

Assess your readiness for CompTIA Security+ Exam SY0-301 and identify where you need to focus and practice. This practical guide walks you through each exam objective, …

Microsoft releases nine security bulletins

The Microsoft Security Bulletin Summary for July 2012 contains nine security bulletins addressing 16 CVEs. Three of the bulletins are rated critical and the other six are …

Best Buy warning users of account compromise?

Best Buy has apparently been deactivating some of its users’ accounts and notifying the owners about it via email. “We are currently investigating increased …

Multi-target phishing campaign hits webmail users

An active phishing campaign that is simultaneously targeting Gmail, Yahoo, AOL and Windows Hotmail email users has been spotted by Webroot. The potential victims receive a …

Simple safe web browsing tips

The most important thing to remember about cyber security is that people using their touchpad or mouse are the last line of defense. Technologies such as anti-virus, safe …

Security vulnerabilities of DVB chipsets

This video from Hack in The Box Amsterdam 2012 focuses on the security of audio and video MPEG streams broadcasted to subscribers via their set-top-boxes by a digital …

Microsoft acquires Perceptive Pixel

Microsoft and Perceptive Pixel announced that they have entered into a definitive agreement under which Microsoft will acquire PPI, a provider of multi-touch display …

Android Trojan attacks European banks

Recently Trusteer discovered the first Tatanga-based man in the mobile (MITMO) attack as well as new SPITMO configurations which are targeting Android mobile banking users in …

Restoring critical applications a top concern

Organizations now operate in a world where employees and customers alike expect critical services to be available and accessible at all times, and it’s forcing IT to …

Don't miss

Cybersecurity news