Check how secure, private and open an app is
Surfing through the Net in search of a objective review of an application can be a daunting task, and even when you find one, it usually barely touches the issues of security …
iPad, iPhone “prizes” as lures for Twitter users
Not surprisingly, spam using the Apple iPad as a lure to get users to give up personal or credit card information has began to make rounds of Twitter users. Sunbelt reveals …
Under protected corporate secrets
Enterprises are investing heavily in compliance and protection against accidental leaks of custodial data (such as customer information), but under-investing in protection …
Splunk 4.1 released
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. Splunk 4.1 …
Healthcare industry overlooks critical gaps in data security
As the healthcare industry prepares for a major shift to electronic health records (EHRs) over the next several years, a new bi-annual report provides data that shows that …
Control Windows desktop administration rights for free
ScriptLogic introduced Privilege Authority, a free solution that allows IT administrators to maintain control of administrator rights while giving end users specific and …
Insufficient employee security training for the cloud
Symantec and the Ponemon Institute announced the findings of a joint survey of IT professionals. The survey revealed that most organizations lack the procedures, policies and …
ZeuS vs. Zeus Killer
Back at the beginning of February, we wrote about the SpyEye toolkit and its author’s intention of encroaching upon Zeus toolkit’s turf by offering a feature that …
Fake gift card scams on Facebook
Whole Foods Market, a Texas supermarket chain, has been fighting the latest gift card scam that takes advantage of the company well-known brand by offering a $500 gift card to …
Free random password generator
The IObit Random Password Generator enables you to produce strong, not easy to crack, passwords for privacy protection – for free. The tool can store randomly generated …
Week in review: Exploitable PDF feature, Google phishing detection and Facebook privacy changes
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 90% of critical Windows 7 vulnerabilities are mitigated by …
How to detect a phishing site, the Google way
Google analyzes millions of pages per day when searching for phishing behavior. This kind of activity is, of course, not done by people but by computers. The computers are …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage