Facebook discovers and “punishes” UID-selling developers
The recent discovery that some Facebook application were inadvertently forwarding users’ UIDs to advertising agencies and data collection companies has spurred the …
New DDoS Trojan used for downing dissident sites
A new DDoS Trojan connected with a slew of attacks against Vietnamese blogs has been discovered by SecureWorks. Dubbed Vecebot, the Trojan drops three files into the …
Secure USB drive with Windows Embedded Standard 7
Spyrus released a secure USB flash drive with Windows Embedded Standard 7 pre-installed. Unlike other USB flash drives that run the Windows operating system, the Secure Pocket …
RAID tower with hardware encryption
Addonics announced a family of Cipher Raid Towers with AES 256-bit full disk hardware encryption, a solution for applications that require reliable storage with redundancy and …
Week in review: Mac OS X Trojan, Bredolab shutdown and Firefox add-on for hijacking online accounts
Here’s an overview of some of last week’s most interesting news, articles and interviews: Firefox extension makes social network ID spoofing trivial “When it …
Privacy and cleaning tool CCleaner 3.0 released
CCleaner is a system optimization, privacy and cleaning tool. It removes unused files from your system. It also cleans traces of your online activities such as your Internet …
One in five card holders use birth date as PIN
Remembering passwords may seem the biggest problem you have when managing your e-mail or social network account, but that’s only because you don’t really believe …
Obama Administration gets a “B” for cybersecurity
The Electronic Privacy Information Center released its annual Privacy Report Card for the Obama Administration and – when compared to last year’s results – …
A peek into Google’s anti-malware operation
Google goes to great lengths to secure its users from threats lurking on the Web, because a half-hearted effort would soon drive them out of business. But, during his …
Microsoft contemplating SSL for Bing
HTTP session hijacking as a possibility and tools to execute it have been around for more than half a decade, but it took an easy-to-use Firefox add-on like Firesheep to point …
Telstra’s blunder leads to massive data leak
It is yet unknown if it was a human or computer error that made Australian telecommunications and company Telstra send out letters containing personal information (name, phone …
New PCI standards completed, tokenization still in question
The PCI Security Standards Council released version 2.0 of the PCI DSS and PA-DSS, designed to provide greater clarity and flexibility to facilitate improved understanding of …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility