Fake eBay pages offering iPhone 4S for half the price
As more and more people take advantage of the option of buying things online, and especially during the holiday season, cyber crooks continually devise new schemes to trick …
SDK advances face recognition for large surveillance systems
Neurotechnology announced VeriLook Surveillance 2.0, a SDK for biometric face identification using live video streams from single or multiple high-resolution digital …
EFF helps travelers defend their data privacy
Anytime you travel internationally, you risk a broad, invasive search of your laptop, phone, and other digital devices – including the copying of your data and seizing …
Firefox 9 closes security holes
Mozilla released Firefox 9 that fixes several security and stability issues. Crash when plugin removes itself on Mac OS X FireBreath developer Richard Bateman reported a crash …
Exostar updates identity management solution
Exostar, whose cloud-based solutions enable secure business-to-business collaboration, announced it has expanded its Managed Access Gateway (MAG) identity management service …
Anonymous aims to make US Senators accountable for their votes
A group of Anonymous-affiliated hackers has made public a considerable amount of detailed personal information of the majority of the 86 US Senators that voted for the …
Amazon users targeted with fake shipping notices
The BlackHole exploit kit has become an increasingly popular way of delivering malware to unsuspecting users. By exploiting a series of unpatched Windows, Java and Adobe …
Android Trojan used for political activism
In the overwhelming majority of cases, mobile Trojans are designed to steal money or information which will ultimately be monetized. But occasionally, there are some out there …
Kim Jong-il death spam carries malware
As expected, malicious spam taking advantage of the death of North Korean leader Kim Jong-il has been hitting inboxes since the news was announced. The emails contain a simple …
First EU report on maritime cyber security
ENISA published the first EU report ever on cyber security challenges in the Maritime Sector. This principal analysis highlights essential key insights, as well as existing …
OWASP ModSecurity Core Rule Set 2.2.3 released
ModSecurity is a web application firewall engine that provides very little protection on its own. In order to become useful, ModSecurity must be configured with rules. In …
Sophos enhances mobile device management platform
Sophos announced Mobile Control 2.0, a mobile device management solution that supports iPhones and iPads, Android phones and tablets, Windows Mobile devices and RIM BlackBerry …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days