Please turn on your JavaScript for this page to function normally.
The Basics of Information Security

As part of the Syngress Basics series, The Basics of Information Security will provide the reader with fundamental knowledge of information security in both theoretical and …

WikiLeaks defector destroyed 3,500+ unpublished files

It seems that the long awaited WikiLeaks leak containing documents regarding Bank of America will not be happening in the near or possibly not in any kind of future, since the …

Nokia Developer forum hacked

The Nokia Developer forum has been hacked and its main page modified to redirect to another page where the individual behind the hack left his mark: The forum is now back in …

ShredIt X 6 for Mac OS X released

Mireth Technology released ShredIt X 6, its file shredder and hard drive cleaner software for Mac OS X. ShredIt X can be used to erase files, folders, disk free space, …

Facebook hacker released on bail

The extent of the attacks mounted by 25-year-old British student Glenn Steven Mangham against Facebook’s servers has been revealed as the Westminster magistrates’ …

Chinese mobile phone monitoring service found

What do you think cyber crooks do with the information collected from mobile phones by malware? Trend Micro has one of the answers to that question. Its researchers have …

Google+ introduces verified accounts

Google is adding another feature that should guarantee that a Google+ profile corresponds with the actual real-life identity of a user. “We’re starting to roll out …

Week in review: First flaws detected in the AES, Android malware and Internet bad neighborhoods

Here’s an overview of some of last week’s most interesting news and articles: Third-party Firefox add-ons to be blocked automatically Mozilla has decided to put a …

Facebook releases official Security Guide

Tired of having to explain to friends and family about the dangers lurking on Facebook? The social network has released an official Guide to Facebook Security, so share the …

Strategies for effective data analytics

Organizations with effective data analytics can make stronger business decisions by learning what is working and what is not, what they are doing well, and where they need …

Trojanized Android app intercepts messages to hide costly subscriptions

Another trojanized Android app that monitors received text messages for keywords has been uncovered by Trend Micro, and this time, the feature is not used for spying but to …

“Free ‘Breaking Dawn Part 2’ tickets” Facebook scam

The penultimate movie in The Twilight Saga has not yet arrived to cinemas, but cyber scammers have decided on an even bigger attraction to lure Internet users into sharing …

Don't miss

Cybersecurity news