Please turn on your JavaScript for this page to function normally.
Apple ships Flashback removal tool for OS X 10.5 Leopard

Following the discovery of a 600K strong Flashback botnet, Apple has been trying to undo the damage to its reputation and has worked on issuing tools, patches and updates …

Environmentally hardened encryption appliance

Certes Networks announced the introduction of their newest encryption appliance, the CEP5 LC. Developed for organizations requiring secure traffic flows to remote locations, …

Pinterest scam toolkits widen the pool of potential scammers

Seemingly overnight, Pinterest gained massive momentum, making cyber scammers sit up and take notice, then jump right in. But the opportunities the site gives to those looking …

Zeus exploits users of Facebook, Gmail, Hotmail and Yahoo!

Trusteer discovered a series of attacks being carried out by a P2P variant of the Zeus platform against users of Facebook, Google Mail, Hotmail and Yahoo – offering …

Sophisticated bogus PayPal emails lead to phishing

PayPal users are currently being targeted with emails purportedly coming from the e-payment giant and asking for their help: Dear Customer, We need your help resolving an …

Adobe privacy solution for advertisers and publishers

Adobe announced enhancements to Adobe TagManager, creating a flexible privacy solution that helps digital advertisers and publishers give consumers notice and control over how …

Forensic access to iCloud backups

iPhone users have several options to back up the content of their devices. They can backup information stored in their device such as contacts, pictures, call logs and data …

McAfee and Intel protect the critical infrastructure together

McAfee announced a collaboration with Intel to better protect the world’s energy utility ecosystem, including generation, transmission and distribution, from increased …

Microsoft shows cloud computing security benefits

Small and midsize businesses (SMBs) are gaining significant IT security benefits from using the cloud, according to a new Microsoft study in five geographies. The study shows …

Getting started with RFID

If you want to experiment with radio frequency identification (RFID), this book is the perfect place to start. All you need is some experience with Arduino and Processing, the …

Fake “Account blocked!” email targets Hotmail users

Hotmail users are once again targeted by phishers. With “E-mail account alert!” in the Subject line, the fake email ostensibly comes from Microsoft. “This …

Android remote systems administration tools

Cura is a mobile phone application bundle of remote systems administration tools. It provides a personalized terminal emulator, a syslog module that allows for reading logs …

Don't miss

Cybersecurity news