Security tips for safer online shopping from mobile devices
47% of employees shopping online will use their company-issued mobile devices: notebook computers, tablets or smart phones. “Digital natives”—ages 18-34, the …
Free tool prevents AutoRun-based malware
Endpoint Protector launched the free AutoRun Disable tool, a solution designed to prevent malware infections spread through USB ports and other computer interfaces and which …
You can do everything right and still be a security attack victim
More organizations now rate information security an upper level priority compared to two years ago, according to a study by CompTIA. But that good news is offset by bad news. …
Most common malware detected on Macs
Recently Sophos launched its free Mac anti-virus for home users which now has 150,000 active users and Sophos has analyzed the most commonly encountered malware that Mac users …
Fake documents sold on Facebook
I never thought I would see a page like this on Facebook, but I guess I shouldn’t be too surprised: “We offer only original high-quality fake passports, …
New Google service could be a godsend to scammers
The Instant Previews service that Google launched last week allows users to click on the magnifying glass icon next to a result’s title or on its background in order to …
Curiosity fuels Chatroulette and Facebook scam
Another scam taking advantage of the curiosity of users is spreading on Facebook. This time, the lure is a supposedly embarrassing and disgusting chance meeting between father …
Online backup Mozy 2.0 for Mac released
Mozy 2.0 for Mac is now available. With improved features and a native-Mac experience, it makes it easier and faster for Mac users to run and monitor backups and restores …
Cloud-based crack of SHA-1 passwords is a taste of things to come
Reports that a German hacker has successfully cracked a secure hashing algorithm (SHA-1) password using a pay-as-you-use cloud computing based parallel processing environment …
Vast majority of organizations continue to adopt encryption
For the first time regulatory compliance has surpassed data breach mitigation as the top reason why organizations deploy encryption technologies, according to Ponemon …
Dell releases endpoint encryption solution
Dell today announced Data Protection | Encryption, a flexible, manageable and auditable endpoint encryption solution. The solution is designed to help companies protect …
E-commerce and online gaming phishing attacks surge
Phishing attacks through impersonation of e-commerce sites and gaming companies increased significantly year-over-year around the world in the third quarter of 2010, according …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)