An anonymous social network in the making?
Spurred by blocked accounts of Anonymous members and activists on various popular social networks such as Facebook, Twitter, and (recently) Google+, a group apparently loosely …
Vulnerable firmware could destabilize Internet-enabled technologies
Kill switches and backdoors inserted at the point of manufacture could act as a conduit for organized criminals or foreign states to access internet-enabled devices, according …
Active Directory Change Reporter 7.0 released
NetWrix released Active Directory Change Reporter 7.0 which automates auditing of who changed what, when and where in Active Directory, Group Policy and MS Exchange, for …
Week in review: Booz Allen Hamilton breach, Google+ related scams and malware ecosystems
Here’s an overview of some of last week’s most interesting news and articles: “Casey Anthony confession video” scam spreads The verdict in the …
Vodafone femtocell hack allows call interception on unpatched devices
News that The Hacker’s Choice had revealed a proof-of-concept attack for hacking Vodafone’s Sure Signal femtocells (routers for boosting phone signals) and turning …
New Hotmail security features against account hijacking
Microsoft has decided to introduce two new security features for its web-based Hotmail service, in the hope that this will make the accounts more difficult to hijack and …
Verizon takes on issue of stolen credentials
Unauthorized access to corporate networks through stolen user names and passwords topped 45 percent in 2010, making credentials the second most compromised data type, …
Secure mobile device access on single authentication platform
SafeNet announced its new mobile device credentialing solution that enables the secure use of consumer mobile devices on corporate networks. SafeNet’s Authentication …
90 people arrested for organized eBay fraud
90 suspects belonging to three different cyber fraud gangs have been arrested following a coordinated action by the Romanian Directorate for the Investigation of Organized …
Apple iDisk users targeted by phishers
Users of iDisk – Apple’s paid online file-hosting service bundled up in the MobileMe package – are being targeted by phishers, warns Symantec. Its …
Is WordPress next in line for silent updates?
Silent software updates are still a topic of contention in the security world, but the successful implementation of the process by Google for its Chrome browser has definitely …
Did U.K. journalists use malware to spy on people?
The scandal that led to the demise of U.K. newspaper News of the World and to an investigation into the illegal methods used by journalists and editors in order to acquire …