Google engineer abuses power, violates privacy of minors
A Google Site Reliability Engineer was fired in July after an internal investigation by the company that confirmed that he violated the privacy of several underage users. …
Top security technologies that stem data breaches
Securosis announced the findings of a comprehensive independent data security survey of more than 1100 multinational IT security practitioners. The survey focused on …
F-Secure Internet Security 2011 released
F-Secure Internet Security 2011 has been designed to be non-intrusive. This means the product only asks for the user’s attention when it’s really necessary. The …
Microsoft patches 11 vulnerabilities
Microsoft released nine security bulletins which include four critical and five important updates to address 11 vulnerabilities affecting Windows, Internet Information …
Growing dangers of digital music and movies
A growing number of cyber threats are associated with the popularity of online music and videos, according to a McAfee report. Researchers found that adding the word …
Debunking the email privacy myth
Email communications are inherently risky, and information transmitted by email, including sensitive data and business-critical transactions, is more vulnerable than most …
Remote monitoring software for BlackBerry
SpectorSoft released eBlaster Mobile, remote monitoring and surveillance software. eBlaster Mobile allows you to remotely monitor the activity of anyone using a BlackBerry …
Samba 3.5.5 security release
Samba is the standard Windows interoperability suite of programs for Linux and Unix. Samba 3.5.5 is a security release in order to address CVE-2010-3069. All Samba versions …
Variable speed encryption appliances
CipherOptics a new line of Variable Speed Encryption (VSE) appliances. While traditional encryption appliances are based on a static throughput, the new VSE line of network …
Global botnet offering DDoS services
Damballa discovered a botnet that offers pay-for-delivery DDoS attacks. The IMDDOS botnet, named after the commercial name on the botnet website, has grown to be one of the …
ESET Cybersecurity for Mac
ESET Cybersecurity for Mac is a new security solution that delivers protection against internet security threats without impacting system performance. Users get both Internet …
Cloud computing trust-based security
Trusted Computing Group, which develops industry standards for hardware-based security rooted in trust, announced an effort to extend the concept of trust to cloud-based …
Featured news
Resources
Don't miss
- North Korean hackers spotted using ClickFix tactic to deliver malware
- Sandworm APT’s initial access subgroup hits organizations accross the globe
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022