Government seizes 82 website domains
Seizure orders have been executed against 82 domain names of commercial websites engaged in the illegal sale and distribution of counterfeit goods and copyrighted works as …
Toshiba announces new self-encrypting drive
Toshiba announced a 7,200 RPM 2.5-inch Self-Encrypting Drive (SED) that provides government-grade AES-256 hardware encryption incorporated in the disk drive’s controller …
Ransomware abounds
Ransomware is any malware that manages to make a computer system or any of the files on it inaccessible to the user and asks him or her to pay up if they want to regain …
Organizations still fail to control USB devices
A survey has found that USB Flash drive ownership has exploded with 100% of the 229 respondents having at least one such device and more than 21% owning as many as 10 or more. …
Behavior of Safari on the iPhone could benefit scammers
A behavior of the Safari browser on the iPhone could be used by phishers and scammers to fool users into believing they have landed on a legitimate site, says Nitesh Dhanjani. …
EU investigates Google antitrust violations
The European Commission has decided to open an antitrust investigation into allegations that Google has abused a dominant position in online search, in violation of European …
Fake Trojan Removal Kit runs ThinkPoint rogue
When looking for an anti-malware solution, it pays to be extra careful. Take the example of the “Trojan Removal Kit”. It is offered on fake security scan pages …
Canon image originality verification proven useless
ElcomSoft discovered vulnerability in Canon’s Original Data Security System, a validation system to guarantee authenticity of digital images captured with supported …
Experiment reveals how scammers earn huge money with simple scams
An interesting experiment conducted by UK-based scam-tracking organization Scam Detectives has revealed how online scams can earn scammers a lot of money in a short time …
Android browser flaw allows attackers to access user data
A vulnerability in the Android browser that could allow attackers to download files stored on the mobile device’s or tablet’s SD card has been discovered by …
Tips to protect yourself from Cyber Monday threats
On the Monday after Thanksgiving, more than 100 million Americans will be using their computers and network connections to search for deals and start their holiday shopping, …
Fake Facebook “photo comment” e-mail leads to malware
As Facebook has announced its new messaging system and its deployment in the coming months, online scammers have been trying to use that announcement against unsuspecting …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility