Please turn on your JavaScript for this page to function normally.
How to create effective CAPTCHAs

Half a year ago, a team of researchers from Stanford University’s Security Laboratory has managed to build a computer program able to solve audio CAPTCHAs and to define …

The rising tide of portable device risks

Responding to research claiming to show that almost a third of executives have rogue mobile devices linked to their organisation’s network, Cryptzone says that this a …

Insecure devices extend shopping risks

Shopping online for the holidays is up, with a 15 point increase in the percentage of Americans who say they will spend more time shopping online than in 2010. But according …

Toolkit cracks encrypted information on iOS 5 devices

ElcomSoft updated the iOS Forensic Toolkit with iOS 5 support for recovering keychain information in iOS 5 devices. Providing near-instant forensic access to encrypted …

Secure replacement for the Certificate Authority System

Convergence is a secure replacement for the Certificate Authority System. Rather than employing a traditionally hard-coded list of immutable CAs, Convergence allows you to …

Free guide to identity theft prevention

Intersections released the second edition of the Double Trouble ebook, that serves as a guide to identity theft prevention, including real-world scenarios where identity theft …

Fake Apple notifications lead to phishing site

When changes are made to an Apple ID account, Apple sends a notification about it to the user so that he can react promptly if the changes weren’t made by him. …

Multitasking DevilRobber Trojan targets Mac OS X users

Another week, another Mac OS X Trojan spotted. Both Sophos and Intego have detected a Bitcoin-mining Trojan that also opens a backdoor into the infected system and steals …

Check Point extends 3D security with Dynasec acquisition

Check Point announced the acquisition of privately held Dynasec, a provider of Governance, Risk Management and Compliance (GRC) solutions. The acquisition extends Check Point …

Network and security analysis with Trisul

Trisul is a new kind of network monitor that supplements fine grained traffic metering with flows, packets, and alerts. You can carry out any kind of network and security …

eFront multiple vulnerabilities

Multiple vulnerabilities have been reported in eFront, according to Secunia. These can be exploited by malicious users to conduct SQL injection attacks and compromise a …

Irresponsible IT disposal methods

Although data security is the primary concern when decommissioning IT equipment, only 61 per cent of companies currently data wipe all of their redundant computers, according …

Don't miss

Cybersecurity news