Protect the privacy of your Android phone
Privacy Blocker is an Android application that stops other installed applications from gathering your personal information. The software basically pinpoints the type of data …
Most organizations can’t access critical security data
Many enterprises feel that their security processes are failing to meet their potential due to a lack of coordination, benchmarking, and proactive improvement among the …
Metrics and measurements in network and service resilience
Business and governments are all reliant on secure networks, but how do you measure the resilience of these networks? The European Network and Information Security Agency …
New Unified Threat Management gateway from Netgear
Netgear introduced the ProSecure UTM150 – a Unified Threat Management (UTM) gateway for businesses with around 150 users. The new UTM150 delivers enhanced graphical …
Week in review: SCADA attack code, Play.com breach and Comodo’s rogue SSL certificates
Here’s an overview of some of last week’s most interesting news, articles, interviews, videos and podcasts: Google blames China for Gmail service disruptions It …
Rustock’s demise linked to Harnig botnet switch off
Late last week, the Rustock botnet was downed by Microsoft and the US Marshals Service after they received permission from the US District Court for the Western District of …
WoW phishing email threatens with account termination
World of Warcraft players are often targeted by phishers whose goal is to get the login credentials to as many accounts possible and bleed them dry. A recently detected one …
Cyber attacks on US federal networks on the rise
The number of cyber attacks against federal government systems and networks has increased nearly 40 percent, says in the annual report on federal cybersecurity efforts …
Randomization of code and binaries for evading AV solutions
An interesting detection evasion technique by a site that serves fake AV has recently been spotted by a Zscaler researcher. The site’s source code has been randomized so …
How to wipe personal information off your mobile phone
People are unsuspectingly selling their personal information to complete strangers as a new report from CPP finds half (54%) of second hand mobile phones contain extensive …
Plagiarism detection tool
SAFE Corporation announced the release of DocMatch, a new tool for comparing all kinds of documents to find plagiarism. DocMatch compares thousands of document files in …
Infosecurity Europe 2011: New attack vectors change the landscape
The cybercrime landscape is changing with the overall cost to the UK economy estimated at £27bn per year, by a recent report by the Office of Cyber Security & …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance