Compliance is more than just cost
Compliance investments, which are basically treated only as a spending to align with compulsory regulations, when extended to all processes including privileged and super …
Sony suffers third breach, PSN still down
Sony’s troubles seem to have no end as the company confirms a third breach of their network and fails to set a date for the restoration of services. This last breach …
“Time spent on Twitter” scam spreads virally
Facebook users are already accustomed to practically daily offers of rogue apps that will supposedly show them who views their profile or allow them to use a similar feature …
Files uploaded to file hosting services accessed by malicious individuals
File hosting services such as RapidShare, FileFactory, Easyshare and others have a number of flaws that make it possible for unauthorized people to access and download files …
Xerox and Cisco partner to deliver cloud services
Xerox and Cisco intend to form an alliance to simplify IT management by delivering cloud-based services and technology solutions that combine network intelligence and print. …
Skype for Mac message processing code execution vulnerability
Pure Hacking, a group of ethical hackers in Australia, reported directly to Skype what they believed to be a zero-day vulnerability in Skype for Mac 5.x The vulnerability in …
New McAfee cloud security platform
McAfee announced the McAfee Cloud Security Platform, a new approach to helping organizations safely and efficiently take advantage of cloud computing. The new platform …
Week in review: Poisoned Google image searches, rogue Mac AV and a Java botnet in the wild
Here’s an overview of some of last week’s most interesting news and articles: Osama bin Laden spam invades Facebook Facebook ads are already spreading using videos …
Poisoned Google image searches becoming a problem
If you are a regular user of Google’s search engine you might have noticed that poisoned search results have practically become a common occurrence. Google has, of …
OpenID Attribute Exchange flaw
The OpenID Foundation has issued an alert for all sites using OpenID that don’t confirm that the information passed through Attribute Exchange – the service …
Facebook scammers go back to using Javascript
Facebook scammers know that in order to keep users falling for their scams, they have to use a variety of approaches. For example, there was a time where rogue applications …
Facebook scam with aggressive spreading mechanism
In a new Facebook scam with an aggressive spreading mechanism, users are informed through the platform’s own notification system and by email that they have been made …