The security landscape from 2010 to 2011
Vendor-neutral testing and certification firm ICSA Labs offers its thoughts on the security landscape spanning 2010 and 2011. Mobile security 1. While most hackers heavily …
Week in review: DDoS attacks, anti-Facebook worm and identity in the digital age
Here’s an overview of some of last week’s most interesting news, interviews, videos, reviews and articles: How to keep mobile devices secure while traveling …
Banknotes of the future?
There may come a time when banknotes will disappear altogether, but that time hasn’t come yet. The criminal practice of counterfeiting money has existed as long as money …
Inclement weather resurrects the “friend in need” scam
This recent spat of snowy weather has grounded may planes and stranded many passengers in Europe. It has also prompted scammers to resurrect en masse the tried and true friend …
Oracle VM VirtualBox 4.0 released
Oracle VM VirtualBox enables desktop or laptop computers to run multiple operating systems simultaneously, and supports a variety of host operating systems, including Windows, …
“American guy must be stoned to death” Facebook scam spreads virally
The latest scam spreading virally on Facebook snares people by making them wonder why This American GUY must be Stoned to De@th for doing this to a GIRL: [LINK] or why This …
Hacker recovers stolen computer and gets criminal caught
In this video recorded at DEFCON, a hacker has his computer stolen, and tells the story of how he recovered it and got the criminal caught. Although the story is quite …
All versions of Internet Explorer under threat
Today Microsoft released a new security advisory to help protect users from a vulnerability affecting Internet Explorer versions 6, 7, and 8. Exploiting this vulnerability …
Steganos Privacy Suite 12 released
The latest version of the all-in-one data protection software, Steganos Privacy Suite 12, combines eight tools for optimizing user privacy protection, including: data …
OpenBSD headman believes contractor tried to insert backdoors
Following last week’s accusation by a former government contractor that the FBI has implemented backdoors into the encryption software used by OpenBSD, Theo de Raadt, …
Fake iTunes e-mail leads to drive-by download
E-mails purportedly coming from iTunes and bearing “iTunes account may be suspended” in the subject line have been hitting inboxes in the last few days. …
“Evil” URL shortener initiates DDoS attacks
Can you believe that clicking on a shortened link can make you an involuntary and unknowing participant in a DDoS attack on a website? Ben Schmidt, a self-styled …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it