Please turn on your JavaScript for this page to function normally.
The hidden message in Toy Story 3 is a Facebook scam

The latest scam to hit Facebook users takes advantage of the recently released Toy Story 3: Sophos reports that from the moment you click on the link, the scam follows a well …

63% consider international cyber-espionage acceptable

Sophos published the mid-year 2010 Security Threat Report, revealing the findings of a survey into attitudes towards cyberwarfare and detailing other trends and developments …

Biometric authentication for iPhone apps

PerSay announced its VocalPassword functionality for iPhone, iPad, and iPod Touch applications. The new capability is poised to replace cumbersome login and strong …

Summer holiday security checklist

SecureWorks outlines its top ten tips for IT and security managers to minimize risk during the holiday season. 1. Hackers don’t go on holiday – Many frontline …

Facebook’s 500 millionth member highlights risks

Lancope is warning IT administrators at Global 1000 companies to be aware of the hidden risks to corporate networks because of social networking sites such as Facebook, …

Disk encryption for Mac OS X

Sophos announced SafeGuard Disk Encryption for Mac, which protects against data breaches of confidential and private information on MacBooks and Macs. Today, businesses are …

Software Blade controls over 50,000 Web 2.0 applications and widgets

Check Point announced its new Application Control Software Blade that enables organizations to secure and manage the use of thousands of Web 2.0 applications in the …

Project Vigilant searching for volunteer hackers at Defcon

Project Vigilant, a division of BBHC Global LLC (an information security firm), is a private, semi-secret, volunteer-based organization of “cyber spies” that is …

Microsoft patches the critical Windows LNK vulnerability

An emergency out-of-band update for patching the critical LNK vulnerability has been released by Microsoft. “The vulnerability exists because Windows incorrectly parses …

Big firms fail the test as social engineers demonstrate their abilities at Defcon

The social engineering capture-the-flag-style contest planned for the second and third day of this year’s edition of Defcon was executed without a hitch. No financial …

Bad news for BlackBerry users in the Middle East

What seems to be a power play between RIM, one of the biggest manufacturers of smartphones in the world and the TRA, the telecommunications regulation body in the United Arab …

Web 2.0 security in the workplace

The use of social networking applications has significantly lowered the security posture for up to 82 percent of organizations in a new survey by the Ponemon Institute and …

Don't miss

Cybersecurity news