Please turn on your JavaScript for this page to function normally.
Social networking safety tips for kids

“Many parents are rightfully concerned about their kid’s participation in social networks. There are a number of areas to be concerned with. Who are the kids …

Apple includes malware removal in security update

Apple just released Security Update 2011-003 which can be downloaded and installed via Software Update preferences, or from Apple Downloads. This is a small update weighing …

Romanian president declared dead by e-mail scam

BitDefender discovered a spam wave using the Romanian president’s image to help spread malware. The unsolicited e-mail relies on a classic combination of social …

Spam rate increases, growth expected to continue

Compared to the previous month, the amount of spam in email traffic increased by 1.2 per cent and averaged 80.8 per cent, according to Kaspersky Lab’s most recent …

Iran aims to exchange the global Internet for a national one

The Iran government is increasingly unsatisfied with the influence the Internet is exercising on the country’s citizens despite its censorship efforts and is planning on …

Encrypt files on Mac with BestCrypt

Jetico announced that their popular BestCrypt Container Encryption software now offers full compatibility with Mac computers. The software delivers data protection. Selected …

Data center IT departments fear targeted attacks

IT departments are now turning to virtualization, with half of the respondents having either implemented or are planning to deploy private clouds, according to a McAfee study. …

Broadcom releases 40nm Wi-Fi and Bluetooth combo chip

Broadcom released the BCM43142 InConcert combo chip which combines Wi-Fi Direct connectivity with seamless proximity-based pairing, simplifying wireless connectivity in the …

Phishing forms on Google Docs

Google Docs is a handy online service for creating various types of documents that are hosted by the company in their cloud and can be made accessible to the greater public. …

Web Application Attack and Audit Framework 1.0 released

The Web Application Attack and Audit Framework’s (w3af) goal is to create a framework to find and exploit web application vulnerabilities that is easy to use and extend. …

PBS website hit by hacktivists, its database leaked online

The hacktivist group behind the Fox breach seems to have made good on its promise to “own more things next week” – they have targeted the PBS website during …

Backdoor instructions for Allied Telesis switches leaked

A simple categorizing mistake has resulted in the publishing of an internal Allied Telesis document that reveals how to set up backdoor accounts for the company’s …

Don't miss

Cybersecurity news