10 most common iPhone passcodes
The problem of poor passwords is not confined to computer use, and the fact was discovered by an app developer who has added code to capture user passcodes to one of its …
Two-factor authentication for Mailchimp using AlterEgo
MailChimp is an innovative company that provides mailing list management services with a twist. Their down-to-earth approach and focus towards the best user experience is what …
Encrypted voice calling for Android
Cellcrypt launched Mobile for Android, a version of its encrypted voice calling application that runs on Android devices operating over Wi-Fi, GSM and CDMA wireless networks. …
LulzSec targets US Senate and online game company
LulzSec has struck again over the weekend, and this time the targets were the official website of the US Senate and the Bethesda Softworks’ computer network. Officials …
Network security scanning and patch management
GFI LanGuard is a network security and vulnerability scanner which provides a complete network security overview, while also providing remedial action through its patch …
National US data security breach notification law on the horizon?
Californian Representative Mary Bono Mack has jumpstarted the latest quest for a national data security breach notification law and is currently working on its draft. Spurred …
Key elements of an effective IT governance process
To successfully implement IT governance, chief information officers (CIOs) require both leadership and execution, according to Gartner. Great IT leaders master process, and …
Trend Micro expands risk management portfolio
Trend Micro announced new solutions for protecting enterprises from Advanced Persistent Threats (APT) known to evade conventional perimeter and content security. Today’s …
PCI Security Standards Council announces PCI awareness training
The PCI Security Standards Council announced that PCI Awareness online training is now available. An introductory level course, the four hour training is designed for anyone …
Web host victims repeatedly exploited by cybercriminals
More than one-third of respondents to an Anti-Phishing Working Group (APWG) survey were repeat victims of phishing attacks that resulted in a successful establishment of …
History and future of mobile malware
Panda Security released a report on the history, current state and future of mobile malware which aims to raise awareness of the threats affecting mobile devices as well as …
Alleged Spanish, Turkish Anonymous members arrested
News that three Spanish nationals linked to Anonymous have been arrested has been followed by the announcement of the Turkish police that it has detained 32 individuals …
Featured news
Resources
Don't miss
- Internet slowly recovers after far-reaching Cloudflare outage
- Google patches yet another exploited Chrome zero-day (CVE-2025-13223)
- What security pros should know about insurance coverage for AI chatbot wiretapping claims
- How attackers use patience to push past AI guardrails
- The privacy panic around machine learning is overblown