Please turn on your JavaScript for this page to function normally.
Fake AV spreading via Yahoo! Answers

From poisoned Google image search results to poisoned answers to legitimate questions on Q&A sites like Yahoo! Answers and public forums, malware peddlers are determined …

41% carry unprotected sensitive information on mobile devices

41 percent of what should be a security savvy audience are carrying sensitive information on mobile devices unprotected, according to Origin Storage. In fact, 19 percent …

Google Chrome sandbox apparently cracked

French security firm VUPEN has announced that its researchers have managed manufacture an exploit able to bypass Google Chrome’s sandbox, ASLR and DEP. It is precisely …

Cyber criminals moving operations to Canada

Cyber criminals are on the move again and, this time, Canada is the prime target. IP addresses in China and Eastern Europe are highly scrutinized and undergoing intense …

Free browser-based security assessment

Shavlik Technologies announced a new browser-based security advisory that helps identify potential security vulnerabilities on a network. Shavlik Security Advisor scans all …

Cloud-based protection for virtualized environments

Panda Security launchd Panda Virtual GateDefender Performa which delivers cloud-based protection for VMWare virtualized environments. Companies can now protect their perimeter …

Compliance is more than just cost

Compliance investments, which are basically treated only as a spending to align with compulsory regulations, when extended to all processes including privileged and super …

Sony suffers third breach, PSN still down

Sony’s troubles seem to have no end as the company confirms a third breach of their network and fails to set a date for the restoration of services. This last breach …

“Time spent on Twitter” scam spreads virally

Facebook users are already accustomed to practically daily offers of rogue apps that will supposedly show them who views their profile or allow them to use a similar feature …

Files uploaded to file hosting services accessed by malicious individuals

File hosting services such as RapidShare, FileFactory, Easyshare and others have a number of flaws that make it possible for unauthorized people to access and download files …

Xerox and Cisco partner to deliver cloud services

Xerox and Cisco intend to form an alliance to simplify IT management by delivering cloud-based services and technology solutions that combine network intelligence and print. …

Skype for Mac message processing code execution vulnerability

Pure Hacking, a group of ethical hackers in Australia, reported directly to Skype what they believed to be a zero-day vulnerability in Skype for Mac 5.x The vulnerability in …

Don't miss

Cybersecurity news