One click away from digital disaster
61 percent of consumers click on links while online that take them to unexpected places, making them vulnerable to cyberattacks that can lead to identity theft, according to …
Ramnit worm uses Zeus Trojan tactics for banking fraud
Trusteer discovered the 18 month old file infecting worm Win32.Ramnit has morphed into financial malware and is actively attacking banks to commit online fraud. Ramnit …
Multiple vulnerabilities in Google Chrome
Multiple vulnerabilities have been reported in Google Chrome, where some have unknown impacts and others can can be exploited by malicious people to bypass certain security …
Privacy screen protection for iPhone and iPad
3M released its range of protection films optimized for tablet PCs and the Apple iPhone. The range consists of two product lines, one delivers visual security from prying eyes …
The Basics of Information Security
As part of the Syngress Basics series, The Basics of Information Security will provide the reader with fundamental knowledge of information security in both theoretical and …
WikiLeaks defector destroyed 3,500+ unpublished files
It seems that the long awaited WikiLeaks leak containing documents regarding Bank of America will not be happening in the near or possibly not in any kind of future, since the …
Nokia Developer forum hacked
The Nokia Developer forum has been hacked and its main page modified to redirect to another page where the individual behind the hack left his mark: The forum is now back in …
ShredIt X 6 for Mac OS X released
Mireth Technology released ShredIt X 6, its file shredder and hard drive cleaner software for Mac OS X. ShredIt X can be used to erase files, folders, disk free space, …
Facebook hacker released on bail
The extent of the attacks mounted by 25-year-old British student Glenn Steven Mangham against Facebook’s servers has been revealed as the Westminster magistrates’ …
Chinese mobile phone monitoring service found
What do you think cyber crooks do with the information collected from mobile phones by malware? Trend Micro has one of the answers to that question. Its researchers have …
Google+ introduces verified accounts
Google is adding another feature that should guarantee that a Google+ profile corresponds with the actual real-life identity of a user. “We’re starting to roll out …
Week in review: First flaws detected in the AES, Android malware and Internet bad neighborhoods
Here’s an overview of some of last week’s most interesting news and articles: Third-party Firefox add-ons to be blocked automatically Mozilla has decided to put a …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark