Is phone phishing making a comeback?
By now, pretty much everyone knows that when one receives an email purportedly coming from a bank or a financial institution, extreme caution and distrust is in order. We have …
70 Romanian cyber crooks arrested
70 people belonging to 3 unconnected cybercrime gangs were arrested yesterday during raids performed by the Romanian police. The gangs m.o. was apparently as follows: they …
Security benchmarks for Windows 7 and Windows Server 2008
The Center for Internet Security (CIS) released its consensus security benchmarks for Windows 7 and Windows Server 2008. The free benchmarks provide prescriptive controls …
Secure communication with RetroShare
RetroShare is an open source cross-platform, private and secure decentralized communication platform. It allows you to securely chat and share files with your friends and …
Facebook will not start charging users
“News” of Facebook’s plan to charge for the use of its network is once again surfacing and being propagated by users and Facebook groups set up (as it seems) …
(IN)SECURE Magazine issue 25 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 25 has been released today. Table of contents The …
First iPad cloud server application
Rackspace Cloud Pro is a free application for the iPad to enable users can turn on backups for a server, create new servers from backups, manage back-up scheduling, re-boot, …
U.S. infrastructure at risk from sophisticated cyber attacks
Nearly three-quarters of federal IT decision-makers who work in national defense and security departments or agencies say the possibility is “high” for a cyber …
Drobo FS: Data storage and protection
Data Robotics introduced Drobo FS which is designed for simple, expandable file sharing. By providing network file sharing capabilities along with automated data protection, …
Generic and behavior-based threats increasing
Sunbelt Software announced the top 10 most prevalent malware threats for the month of March 2010. The list shows the continued prevalence of Trojan horse programs circulating …
Check how secure, private and open an app is
Surfing through the Net in search of a objective review of an application can be a daunting task, and even when you find one, it usually barely touches the issues of security …
iPad, iPhone “prizes” as lures for Twitter users
Not surprisingly, spam using the Apple iPad as a lure to get users to give up personal or credit card information has began to make rounds of Twitter users. Sunbelt reveals …