WikiLeaks founder loses extradition appeal
Wikileaks’ founder Julian Assange has lost another appeal to the February decision by a UK court that he should be extradited to Sweden in order to face possible charges …
How organizations manage cloud computing security risks
A Ponemon Institut survey of 1,000 IT security practitioners and enterprise compliance officers revealed that less than half of all respondents believe their organizations …
Scan your PC for common vulnerabilities
The Secunia Online Software Inspector, or short OSI, is a fast way to scan your PC for the most common programs and vulnerabilities, thus checking if your PC has a minimum …
Security concerns limit cloud computing use in law firms
Law firm technology managers are tempering their interest in cloud computing with a heightened focus on security, according to an annual survey published in The American …
Fraud prevention and bot protection
Imperva announced the availability of SecureSphere 9.0 and introduced ThreatRadar Fraud Prevention Services and defined a new Web security architecture that not only …
Nearly 50 chemical, defense companies hit with cyber espionage attacks
Nearly 50 (and quite possibly more) companies in the chemical, defense, and other sectors have been hit with a spear phishing campaign carrying a backdoor Trojan with the …
Online social networks: Malware launch pads
With the advent of social networks, the online world has become a virtual society. Social networks serve as seamless communication channels, but at the same time they are …
How to create effective CAPTCHAs
Half a year ago, a team of researchers from Stanford University’s Security Laboratory has managed to build a computer program able to solve audio CAPTCHAs and to define …
The rising tide of portable device risks
Responding to research claiming to show that almost a third of executives have rogue mobile devices linked to their organisation’s network, Cryptzone says that this a …
Insecure devices extend shopping risks
Shopping online for the holidays is up, with a 15 point increase in the percentage of Americans who say they will spend more time shopping online than in 2010. But according …
Toolkit cracks encrypted information on iOS 5 devices
ElcomSoft updated the iOS Forensic Toolkit with iOS 5 support for recovering keychain information in iOS 5 devices. Providing near-instant forensic access to encrypted …
Secure replacement for the Certificate Authority System
Convergence is a secure replacement for the Certificate Authority System. Rather than employing a traditionally hard-coded list of immutable CAs, Convergence allows you to …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance