Software protects passwords via host of dummy cursors
Virtual keyboards have helped thwart keyloggers, but some danger while entering passwords still remained, as some malware is also capable of taking screenshots or even record …
Most interesting products at RSA Conference 2013
The RSA Conference held each year in San Francisco is the biggest security event in the world, attracting tens of thousands visitors and (this year) over 350 exhibitors. Not …
Pwn2Own: IE, Firefox, Chrome and Java go down
The Pwn2Own competition is underway at the CanSecWest conference in Vancouver, and during the first day of competition Java, IE 10, Firefox and Chrome were successfully …
Abrupt drop in Symbian malware
In what may be the only good news for Symbian, F-Secure’s latest Mobile Threat Report shows a drop in malware targeting the declining platform to just four percent of …
SolarWinds Alert Central: Free tool for managing IT alerts
SolarWinds announced a first full-featured yet free product, SolarWinds Alert Central. IT pros can now centralize multi-system IT alerts in a single, consolidated view, give …
BitInstant back online following breach, Bitcoin theft
BitInstant, one of the online Bitcoin exchange services, has been down and unaccessible from Thursday evening to Monday due to a “sophisticated attack,” which …
Samsung Galaxy devices’ lock screen easily bypassed
This week revealed not one, but two security vulnerabilities that allow anyone to bypass the lock screen on a variety of Samsung Android smatphones. On Monday UK blogger …
Google reports on non-court ordered FBI data requests
With every new Transparency Report that Google releases biannually since 2009, new information about data requests from government agencies are included. This last report, …
Malicious Java applet uses stolen certificate to run automatically
A signed but malicious applet that will apparently fool even the latest Java 6 update has been discovered on a German online dictionary website infected by the g01pack exploit …
99 percent of web apps vulnerable to attack
A new Cenzic report demonstrates that the overwhelming presence of web application vulnerabilities remains a constant problem, with an astounding 99 percent of applications …
Identity theft on the rise this tax season
The threat of identity theft this tax season leaves consumers with more to worry about than whether or not a tax return is in the mail. A thief may use sensitive information, …
Bogus Delta receipt confirmation leads to malware
Once again, Delta Air Lines customers are being targeted with spoofed emails supposedly carrying their eTicket, and are urged to download and open the attached PDF file …
Featured news
Resources
Don't miss
- Poland repels data-wiping malware attack on energy systems
- Inside Microsoft’s veteran-to-tech workforce pipeline
- Brakeman: Open-source vulnerability scanner for Ruby on Rails applications
- Incident response lessons learned the hard way
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks