Cloud identity tools for LinkedIn, Twitter and Microsoft Live
Ping Identity released Cloud Identity Connectors for LinkedIn, Twitter, and Microsoft Live, enabling the enterprise to rely on cloud service providers and social networking …
SCADA SIEM for critical infrastructure protection
AlienVault released its ICS SIEM, a family of purpose-built appliances which provide a platform for security and compliance management across industrial process control …
Fake Epsilon breach warning tricks users
Among the most annoying things you can find online are pages that pretend to offer or try to push a service in order to make money by simply referring the user to another …
35 million Google Profiles collected into private database
If you are one of those individuals that made their own Google Profile, chances are that you knew and agreed to the fact that the information you included in it will be …
The resurrection of the Mariposa botnet
When the news that the Spanish police arrested the three individuals suspected of running the Mariposa botnet was made public back in March 2010, it was generally thought that …
New Mac Defender variant doesn’t need your admin password
There is a new variant of the Mac Defender rogue AV out there, and this one doesn’t require users to enter the administrator password in order to install the program, …
Spam not the problem it once was
Email spam is still an everyday occurrence, but not the nuisance it once was, according to Avira. Nearly half of all end-users are satisfied with the anti-spam filters on …
How banks use Twitter to combat fraud
With phishing attacks hurting the credibility of email communications, forward thinking banks are turning to social media as the best channel to warn customers of scams and …
The evolution of traditional desktops into personal clouds
As users go virtual in all aspects of their life, the notion of doing all their work on a single traditional desktop in one physical location is rapidly evolving. …
Program defeats audio CAPTCHAs, researchers learn how to improve it
A group of researchers from Stanford University’s Security Laboratory has managed to build a computer program able to solve audio CAPTCHAs, reported the University on …
Comodo Brazil breached, sensitive data leaked
The recent spate of attacks against Sony’s various assets has probably made a lot of companies thank their lucky stars that they aren’t the ones who have been …
Apple acknowledges Mac Defender existence, gives removal instructions
It took a while for Apple to react properly to the onslaught of Mac Defender and similar fake AV aimed at Mac users, but they finally did it. Only days after the revelation of …