10 holiday ID theft prevention tips
In the search for the ultimate holiday gift or the biggest bargain, consumers need to make sure that they are not putting their identity at risk this holiday season. To help …
Oracle Solaris 11 Express released
Oracle Solaris 11 Express delivers advanced Oracle Solaris features that have been in development for over five years in a production-ready package, allowing customers to …
Holiday spam e-mail runs start off
Spammers peddling fake pills, replica watches, jewelry and bags are gearing up for the approaching holidays. According to Trend Micro researchers, using the upcoming Black …
Proof-of-concept Android app reveals platform’s security bug
Angry Birds is an extremely popular mobile game that can be played on Apple, Android and Nokia mobile devices – indeed, it has been downloaded by millions of users. So, …
Half of SMBs block employee access to Facebook
Companies are becoming more vigilant when it comes to their employees’ use of social networking sites, according to Webroot. The survey of more than 1,000 businesses …
40% of all rogueware was created in 2010
PandaLabs warned that 40% of all fake antiviruses ever have been created this year. That is, ever since this type of malicious code was first reported four years ago, …
Vulnerability assessment for Microsoft SQL Azure
Sentrigo announced Repscan 4.0 which offers expanded support for cloud-based and open source database platforms, productivity enhancements for database administrators (DBAs) …
VLC 1.1.5 fixes Windows vulnerability
The VLC development team introduced VLC 1.1.5, the sixth release of the 1.1.x branch of VLC. This release focuses on minor features, bugfixes and security issues: …
Will ears replace fingerprints as a form of ID?
Fingerprint checks and iris scans may be the most popular ways of biometric identification for the time being, but it looks like they might soon be joined – if not …
Security preparations for IPv6 migration must start now
The arrival of a slew of new and upgraded operating systems, smartphones and tablets that are enabled for IPv6 has the potential to open new and unrecognized security …
Top 10 security threats for 2011
Imperva announced their predictions for the top ten security trends for 2011 which have been compiled to help IT security professionals defend their organization against the …
Lethic Trojan is back, uses same stolen digital certificate as Stuxnet
Some two months ago, the world found out about the Stuxnet – the worm that used the Windows .lnk file vulnerability in order to spread through removable drives of …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility