Searching for Google Chrome can lead to malicious content
Searching for a link to download Google Chrome might result in a malware infection, warns a Websense researcher. According to him, if a user enters the term “Download …
Carberp Trojan targets French broadband subscribers
Last year, Carberp emerged on the online banking fraud scene as a competitor to the dominant financial malware platforms Zeus and SpyEye. Trusteer recently discovered a …
Securely upload data to the AWS cloud
Amazon announced AWS Storage Gateway, a service that provides a new option to securely upload data to the AWS cloud. The AWS Storage Gateway connects an on-premises software …
Targeted attacks will change the economics of security
Today, European Justice Commissioner, Viviane Reding, will unveil the new European Privacy Directive, designed to safeguard personal, identifiable information that is stored …
IT industry business confidence remains flat
IT companies express tempered optimism heading into the first quarter of the year, though longer-term prospects look more promising. CompTIA projects a worldwide IT industry …
Cloud-based fuzzing for zero-day vulnerability discovery
Codenomicon released the Fuzz-o-Matic cloud-based software security Testing-as-a-Service (TaaS) platform for enterprise software and applications running on Windows, Linux, …
Comprehensive Java testing solution
Parasoft introduced a new release of Parasoft Jtest: a comprehensive Java testing solution that automates static analysis, unit testing, coverage analysis, runtime error …
Google+: The Missing Manual
If you want to gain more control over your social networking activities with Google+, this jargon-free guide helps you quickly master the ins and outs of the site. Learn how …
Hacker allegedly leaks 100K Facebook account credentials of Arab users
The slew of hacks, leaks of credit card information, DDoS attacks and defacements executed by Arab and Israeli hackers that transferred part of the longstanding, real world …
Researchers discover network of 7,000 typo squatting domains
A network of some 7,000 typo squatting domains is being used by scammers to effectively drive traffic towards their scammy sites, some of which get so much traffic that they …
IT managers express concerns over tablet security
Cisco commissioned a survey 1500 IT managers and executives in the US, Canada, UK, France, Germany and Spain to assess attitudes, fears and hopes for tablets in the workplace. …
Criminals stole $3.4B from online revenues in 2011
Merchants are making gains against fraud but the battle continues, according to CyberSource, a Visa company. The fraud rate by order (the percentage of orders that turned out …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days