DNS-changing Trojan leads to phishing banking sites
Latin American Internet users are constantly attacked by cyber crooks who aim to get their online banking credentials in order to perpetrate identity theft and banking fraud. …
UFED Touch: Field-ready mobile forensics solution
Cellebrite launched UFED Touch, a solution for investigators to extract and decode digital evidence from mobile devices including smartphones, legacy phones, portable GPSs and …
17% of the world’s PCs are unprotected
Lack of consumer PC protection is a global problem. In a study that analyzed data from voluntary scans from an average of 27-28 million computers per month, McAfee researchers …
Security posture management from FireMon
FireMon announced Security Manager 6.0, a security policy and posture management solution that integrates risk analysis with configuration management, enforcement and auditing …
(IN)SECURE Magazine issue 34 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 34 has been released today. Table of contents: …
WikiLeaks founder Assange loses extradition appeal
WikiLeaks founder Julian Assange has lost his final extradition appeal as the Supreme Court in London decided that the Swedish Prosecuting Authority had the right to issue the …
Security and privacy in the AWS cloud
Security is the number one question that most C-Level executives ask about the cloud. In this video, Stephen E. Schmidt, General Manager and CISO, shares some of the details …
Securing the Virtual Environment
As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small …
Flamer removal tool from Bitdefender
Bitdefender released a tool to find and remove the most complex, dangerous spy tool yet discovered, the newly discovered Flamer attack toolkit. Flamer, also known as Skywiper, …
What’s new in ISO 22301: How to make a transition from BS 25999-2
Currently there are many business continuity frameworks and standards around the world, but none of them have really taken the dominant position. ISO 22301 will probably …
Trojan spyware promoted as Steam keygen
Scouring the Web for “legitimate” key generators, or keygens, is a risky business at the best of times. We make it a point that whoever the source is must have …
Facebook Timeline Remover is still alive
You may have seen reports of a Facebook themed “remove my timeline” scam, where users are asked to install a browser extension to roll Facebook back to the way it …
Featured news
Sponsored
Don't miss
- Chrome, Edge users beset by malicious extensions that can’t be easily removed
- Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200)
- Scout Suite: Open-source cloud security auditing tool
- Steps to improve quality engineering and system robustness
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)