Interest in royal wedding abused by fake AV peddlers
As the day of the wedding of Prince William of England and his long-time girlfriend Kate Middleton quickly approaches, scammers have began to exploit the interest of Internet …
IT teams still struggling with spam and viruses
IT teams are still struggling to protect their businesses from spam email and viruses, according to Mimecast. Their research also finds that the majority of organizations are …
Video: Inside the new Facebook data center
Facebook recently opened its new data center in Oregon and journalists were able to visit the Prineville facility. The videos below, recorded by Data Center Knowledge, take …
Prevent an interruption to cloud services
AEP Networks responded to the concerns over the loss of connectivity to cloud-based applications by launching a communications platform that automatically diverts cloud …
Android and iOS downloadable Microsoft PlayReady-based DRM solution
AuthenTec announced the first Microsoft PlayReady-based downloadable DRM client solution for Android and iOS devices. The offering is now part of its Downloadable DRM Fusion …
Your iPhone keeps an unencrypted record of your movements
If you are an owner of an iPhone or a 3G iPad, you’ll probably want to know that your location – along with a timestamp – is recorded by the device and …
Facebook announces two-factor authentication
Facebook will be rolling out the two-factor authentication option which, once turned on, will ask users to insert a code when they try to log into the social network from a …
Encrypted text messaging for BlackBerry and Android
ProtectedSMS enables BlackBerry and Android users to exchange secure, encrypted text messages with individuals who have installed the software. Unlike other secure texting …
U.S. federal lab linked to Stuxnet breached
A federally funded U.S. lab that is suspected to have been involved in finding the vulnerabilities in Siemens SCADA systems used by the Stuxnet worm has shut down the Internet …
Michigan police downloading drivers’ phone data without warrants?
For a few years now, the Michigan State Police has been using portable devices that allow them to secretly extract personal information from cell phones of drivers who have …
Most employees would steal confidential company information
The majority of IT staff and C-level executives would definitely take confidential company information when they left their organization, according to Cyber-Ark. Despite 66% …
Dramatic increase in cyberattacks on critical infrastructure
A survey of 200 IT security executives from critical electricity infrastructure enterprises in 14 countries found that 40 percent of executives believed that their …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)