Google sent out notifications to owners of hacked sites
Matt Cutts, the head of Google’s Web spam team, has announced on his Twitter account that the company has notified 20,000 Web site owners that their sites may have been …
Fake jobs site owner filed tax returns with stolen identities
A 31-year-old that has set up a website offering the possibility for unemployed people to apply for non-existing jobs and has been using the collected applicants’ …
Businesses unable to comply with EC 24 hour breach notification
UK businesses do not believe they have the capability to comply with new European Commission Data Protection Directive rules, specifically the ability to generate accurate …
ISO 27001/BS 25999-2: The certification process
Obtaining an ISO 27001 or BS 25999-2 certificate is not mandatory, however most of the companies implementing either of these standards want to get certified – the main …
BYOT: Bring Your Own Token
SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization. At the click …
MCTS 70-680 Rapid Review: Configuring Windows 7
Assess your readiness for MCTS Exam 70-680—and quickly identify where you need to focus and practice. This practical guide walks you through each exam objective, providing …
Most parents secretly access teens’ Facebook accounts
For generations, parents have been suspicious of teens’ social activities – and have employed any number of tactics to uncover the truth. Today’s parents are …
New York top city for online fraud activity
New York is the nation’s epicenter for online fraudsters, followed by Atlanta, Chicago, Los Angeles, and Omaha respectively. Leveraging a sample of nearly a billion …
Flashback botnet decline not as fast as expected
Given the attention that the Flashback Mac malware has received since the discovery of the 600K strong botnet of computers infected with it and the number of tools that …
New firewall safeguards against medical-device hacking
Researchers at Purdue and Princeton universities have created a prototype firewall to block hackers from interfering with wireless medical devices such as pacemakers, …
Mobile phones expose businesses to massive risks
Organizations are failing to respond to the culture of employees using their own mobile devices for work and are opening up their systems to security risks. These are the …
Malware disguised as new Instagram Android app
Instagram, the popular free photo sharing app for iOS devices, is now available for download for Android users on Google Play and Instagram’s website. Unfortunately, a …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits