The execution of the RSA hack
More than two weeks have passed since the high profile RSA hack, and the company has finally decided to share some of the details regarding the attack. The question that is …
Webroot Mobile Security for Android released
Webroot released Mobile Security for Android which protects users as they browse, text, and download apps on Android devices. A basic version, offering more limited features, …
Multiple vulnerabilities in IBM Tivoli Directory Server
Multiple vulnerabilities have been reported in IBM Tivoli Directory Server, which can be exploited by malicious users to disclose sensitive information and by malicious people …
Week in review: New cybercrime currency, massive SQL injection attack and Facebook battling scammers
Here’s an overview of some of last week’s most interesting news, videoas and articles: Intellectual capital is the new cybercrime currency Cybercriminals …
Recidivist youngster sentenced for new hack
27-year-old Van T. Dinh has been sentenced to three years in prison and ordered to pay $125,000 in restitution for having breached an online currency exchange service …
Computer experts back appeal in Twitter-Wikileaks case
A number of respected security experts have decided to formally speak up in favor of the appeal that lawyers have filed against the Twitter data handover decision in WikiLeaks …
Pharmaceutical spam and mobile threats dominate
Wannabe cybercriminals were able to execute attacks with impunity and relative ease thanks to toolkits, pre-written software programs designed to steal information, rendering …
New Android Trojan punishes pirates
A new Android Trojan is up an about, and can be find on several of the most popular file sharing sites in the US and Asia. Disguised as a non-existent version of the …
Tips to prevent identity theft during tax season
PrivacyGuard would like to help educate consumers with the following tips on how to prevent identity theft during tax season. When preparing your return 1. Be aware of …
Personalized cloud-based platform
NetQin announced a personalized cloud-based platform that allows users to synchronize their personal data across multiple devices with single account. Backed by a cloud …
Facebook battles likejacking scammers
Facebook and its users have been plagued for a while now by a seemingly never ending steady stream of scams, among which are those that hijack users’ “likes” …
Vulnerabilities in common web applications escalate
A new Cenzic report reveals widespread Web application vulnerabilities, with 2,155 discovered – a third of which have both no known solution and an exploit code publicly …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence