Confidential data exposure in public spaces
While protecting data on computers is top of mind for everyone, most organizations are focused on conventional security technologies such as anti-virus software, personal …
Top software failures of 2011
SQS Software Quality Systems compiled a list of the worst software failures of 2011 that have damaged reputations, impacted negatively on financials and caused stress to …
Holiday travel is risky business for mobile devices
The holidays are a time for tropical getaways, traveling to Grandma’s house to see family and friends and one of the likeliest times a person will lose their mobile …
iPad 2 and $1,000 gift cards offered by scammers
Typosquatting is often-used tool by online scammers who try to take advantage of users looking for legitimate pages, and a recently spotted spam campaign is employing that …
Card info of 1m Restaurant Depot customers stolen in breach
Customers of US foodservice wholesaler Restaurant Depot and “cash and carry” chain Jetro have begun receiving letters warning them about the possibility of their …
NETGEAR router with Mac features
NETGEAR announced Wireless Extreme for Mac and PC (WNDRMAC), the company’s first home router to offer Mac-specific capabilities – including native support for …
Managing firewalls in virtual environments
AlgoSec announced the ia solution for managing firewalls in virtual environments. AlgoSec Security Management Suite simplifies hypervisor-level firewall management by …
The risks of unauthorized access
HP unveiled new global research that reports increased threats to sensitive and confidential workplace data are created by a lack of control and oversight of privileged users, …
Chrome is the most secure browser, claims new study
Microsoft’s Internet Explorer does a better job protecting systems from attackers who already have gained some degree of access than Mozilla’s Firefox, and …
2,000 live typosquatted domains discovered
Customers of major high-street brands such as Argos, Debenhams, and John Lewis are falling victim to cybercriminals that target mistyped web addresses, a technique known as …
Spam campaign bypasses Gmail filters, employs Google Docs
Every now and then, online crooks and spammers use Google Docs to host phishing forms or documents with embedded malicious links. One such spam campaign is currently …
Premium SMS fraudulent apps target European users
European mobile phone users should be on the lookout for premium SMS toll fraud apps as a great number of them has been lately discovered on file sharing sites, third-party …
Don't miss
- Commix: Open-source OS command injection exploitation tool
- Review: The Chief AI Officer’s Handbook
- How QR code attacks work and how to protect yourself
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects