Free anti-virus technology for Amazon EC2
AVG announced free anti-virus technology for Amazon EC2 users. The preconfigured software bundled within an Amazon Machine Image (AMI) is now available on the Amazon Web …
iOS and Android more secure than PCs?
While the most popular mobile platforms in use today were designed with security in mind, these provisions are not always sufficient to protect sensitive enterprise assets …
Solution for Popureb rootkit infection
Bootkits are kernel-mode rootkit variants that hide in the computer’s master boot record (MBR) and are notoriously difficult to spot and, sometimes, to eradicate. …
Gannett Government Media user information stolen
The Gannett Government Media family of websites suffered a cyber attack on resulting in unauthorized access to files containing user information. The information in those …
Hackers publish stolen PayPal login credentials
LulzSec has been assimilated back into Anonymous, but their AntiSec campaign keeps going. It seems that their final wish has been granted for now, and other hacking groups …
Thousands of Tumblr accounts compromised
Tumblr users have been targeted with an aggressive phishing campaign in the last week or so and are still being lured into entering their login credentials for access to adult …
Encrypted voice calling for the iPhone
Cellcrypt Mobile for iPhone provides voice call encryption for commercially available off-the-shelf cell phones using government-certified security through an easy-to-use …
Security vendor applauds LulzSec attacks
In an unexpected move for a security company, SecurEnvoy today said that cyber break-ins and advanced malware incidents, such as the recent DDoS attack by LulzSec, should …
Identity theft doesn’t take vacations
Identity theft is a real risk and one that is amplified during the summer months. Recent survey results indicated that, whether booking flights at home, logging on at a Wi-Fi …
Protect your computer and phone from illegal police searches
Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your home to search …
Spammers push cloned apps on Android Market
No stone is left unturned, no option unexplored when it comes to online spamming, and the latest approach has shown that malware authors are not the only ones who have taken …
LulzSec ends 50 days hacking streak, says goodbye
The LulzSec “boat” has sailed into the sunset after 50 days of “disrupting and exposing corporations, governments, often the general population itself, and …