Please turn on your JavaScript for this page to function normally.
Compliance is more than just cost

Compliance investments, which are basically treated only as a spending to align with compulsory regulations, when extended to all processes including privileged and super …

Sony suffers third breach, PSN still down

Sony’s troubles seem to have no end as the company confirms a third breach of their network and fails to set a date for the restoration of services. This last breach …

“Time spent on Twitter” scam spreads virally

Facebook users are already accustomed to practically daily offers of rogue apps that will supposedly show them who views their profile or allow them to use a similar feature …

Files uploaded to file hosting services accessed by malicious individuals

File hosting services such as RapidShare, FileFactory, Easyshare and others have a number of flaws that make it possible for unauthorized people to access and download files …

Xerox and Cisco partner to deliver cloud services

Xerox and Cisco intend to form an alliance to simplify IT management by delivering cloud-based services and technology solutions that combine network intelligence and print. …

Skype for Mac message processing code execution vulnerability

Pure Hacking, a group of ethical hackers in Australia, reported directly to Skype what they believed to be a zero-day vulnerability in Skype for Mac 5.x The vulnerability in …

New McAfee cloud security platform

McAfee announced the McAfee Cloud Security Platform, a new approach to helping organizations safely and efficiently take advantage of cloud computing. The new platform …

Week in review: Poisoned Google image searches, rogue Mac AV and a Java botnet in the wild

Here’s an overview of some of last week’s most interesting news and articles: Osama bin Laden spam invades Facebook Facebook ads are already spreading using videos …

Poisoned Google image searches becoming a problem

If you are a regular user of Google’s search engine you might have noticed that poisoned search results have practically become a common occurrence. Google has, of …

OpenID Attribute Exchange flaw

The OpenID Foundation has issued an alert for all sites using OpenID that don’t confirm that the information passed through Attribute Exchange – the service …

Facebook scammers go back to using Javascript

Facebook scammers know that in order to keep users falling for their scams, they have to use a variety of approaches. For example, there was a time where rogue applications …

Facebook scam with aggressive spreading mechanism

In a new Facebook scam with an aggressive spreading mechanism, users are informed through the platform’s own notification system and by email that they have been made …

Don't miss

Cybersecurity news