The threat behind fake LinkedIn messages
Retarus sent out a warning in response to a current wave of fake contact requests via the social media platform LinkedIn. These well-simulated e-mail messages present a …
Guide helps enterprises design and implement key controls
Recent international regulations have placed the need for monitoring internal controls at the top of the boardroom agenda. Having controls in place is a basic business …
High expectations for personal information protection
According to a recent survey by ING, nine in 10 adults agree that financial services companies should be doing more to protect their customers’ personal and financial …
Navigation and fingerprint authentication device
AuthenTec unveiled today the world’s smallest fingerprint sensor for combining authentication and navigation functions in one device, the AES850. This low profile sensor …
Web-voting option suspended due to a system flaw
The option of casting your vote through the new D.C.’s Digital Vote by Mail system has been suspended because of a vulnerability that allowed a public tester of the …
Politically motivated cyber attacks
According to a new report, 53 percent of critical infrastructure providers report that their networks have experienced what they perceived as politically motivated cyber …
Alleged leader of carding gang arrested
A Ukranian national suspected of being the leader of a gang involved in counterfeiting payment cards has been taken into custody by the Russian police. The arrest has been …
Security updates for Adobe Reader and Acrobat
Critical vulnerabilities have been identified in Adobe Reader 9.3.4 (and earlier versions) for Windows, Macintosh and UNIX, Adobe Acrobat 9.3.4 (and earlier versions) for …
Cryptome hacked, founder e-mail account ransacked
Cryptome.org, the well-known whisteblowing site, was hacked during this past weekend, and all of its content (approximately 7GB of data) was deleted by the hacker who then …
The rise of crimeware
Nearly two billion people today use the Internet and in doing so, expose themselves to an extensive and growing number of malware threats. CA researchers identified more than …
The persistence of Trojan attacks and scareware
GFI announced the top 10 most prevalent malware threats for the month of September 2010. Statistics show a staggeringly consistent attack primarily by the same Trojan horse …
WatchGuard gets virtual on security
WatchGuard released a virtualized version of their Quarantine Management Server. Used in conjunction with WatchGuard XCS content security appliances, the WatchGuard QMS …
Featured news
Resources
Don't miss
- 6 considerations for 2025 cybersecurity investment decisions
- BlackLock ransomware onslaught: What to expect and how to fight it
- Cybercriminals shift focus to social media as attacks reach historic highs
- The risks of autonomous AI in machine-to-machine interactions
- Balancing cloud security with performance and availability