Google’s Gmail security checklist
Every now and then, Google adds tools and issues warnings that are meant to help its users feel and stay safe while using their offerings – the recent warning to Gmail …
Rogue Facebook app takes over accounts
A flurry of statuses saying “OMG! Im never going to send another text message again after seeing this!” and “OMG! Im not txtin again now that I have seen …
Ubuntu 10.10 desktop, netbook and server editions released
Ubuntu 10.10, codenamed “Maverick Meerkat”, is now available for download. Ubuntu 10.10 introduces an array of online and offline applications to Ubuntu Desktop …
New film exploring online security
A new project called “The Gran’ Scam of Things” is in the works. The premise of the short film poses serious questions about online financial abuse by taking …
Week in review: The future of malware, iTunes phishing attack and computer “health certificates”
Here’s an overview of some of last week’s most interesting news, articles, reviews, interviews and podcasts: XSS flaws found on three security firms’ …
Future malware will steal behavioral and relationship patterns
Whenever something of tangible value exist, there will always be those who will try to steal it, says a group of international researchers that recently published a paper on …
Free Stuxnet removal tool
BitDefender released a free removal tool targeting all known variants of the Stuxnet worm, as well as the rootkit drivers that are used to conceal critical components of the …
Trojan overrides Firefox password-saving behavior
A curious new information-stealing Trojan that patches a core Firefox file in order to override the browser’s behavior has been discovered by Webroot researchers. Every …
Operation Payback: Anonymous group causes service interruptions
The DDoS attacks organized by the Anonymous cyber-activist group against SGAE (Spanish copyright collection society), the Spanish Culture Ministry and Promusicae, which began …
Spammers using new URL obfuscation technique
Spammers and scammers are always on the lookout for new tricks to use to bypass URL filters and deliver the links to unsuspecting victims, and lately they have discovered that …
Twitter “wrong credential combination” phishing scheme
If you have followed a link on a Twitter message from a contact that says “You have to be the first to see these new pictures!! LINK” and entered you username and …
Are computer “health certificates” the answer for the botnet problem?
Back in March, at the RSA Conference in San Francisco, Corporate Vice President for Trustworthy Computing at Microsoft Scott Charney proposed to the audience and to the world …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)