On-demand export compliance solution
Management Dynamics released Export On-Demand 1.2, its export compliance solution for small and medium-sized exporters. The new release provides for enhanced compliance …
LinkedIn mimics Facebook, introduces questionable on-by-default feature
Facebook’s regular introduction of on-by-default features often creates quite a stir when first introduced. The majority of Facebook users isn’t aware of – …
Facebook and the publishing of mobile contacts scare
Facebook users are once again in a tizzy after having been faced with variations of the following message posted by some of their friends. Friends! ALL THE PHONE NUMBERS IN …
Citigroup suffers second data breach in four months
Less than four months after the breach that affected some 200,000 Citigroup customers comes the news that the personal data of 92,000 Citi Cards Japan users has been …
Tips for promoting good online behavior
The explosion of mobile devices such as smartphones and tablet computers has raised a new concern for parents as they pack their children off to school for the New Year: …
Android malware masquerading as love test app
Online Chinese third party app stores are a treasure trove of Android malware which hides under many guises. Their goal is often the same: get permission from the user to send …
Multiple vulnerabilities in Symantec Endpoint Protection Manager
Multiple vulnerabilities have been discovered in Symantec Endpoint Protection Manager, which can be exploited by malicious people to conduct cross-site scripting and request …
OpenDNSSEC 1.2.2 released
Internet engineers continue to enhance Internet security with the release of OpenDNSSEC, a tool which simplifies the process of signing one or more zones with DNSSEC. …
Identity thief admits stealing $770,000
A Brooklyn, N.Y., man pleaded guilty for his role in managing a credit card fraud operation that operated throughout the East Coast of the United States. Jonathan Oliveras, …
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the …
China hit by almost half a million cyber attacks in 2010
China has been hit with almost half a million cyber attacks last year, claims a report by the country’s National Computer Network Emergency Response Technical …
OpenLeaks calls on hackers to attack its test site
Since Daniel Domscheit-Berg’s public disagreement with Julian Assange and his decamping from WikiLeaks, there hasn’t been a secure place for whistleblowers to drop …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark