Cybersecurity bill changes, US president not permitted to shut down the Internet
Six months ago, two bills regarding cybersecurity were introduced in the US senate and a lot of people objected to the possibility that the bills would allow the US president …
Should major ISPs join the fight against botnets?
The recent “de-peering” of the AS-Troyak ISP and its consequent struggle (and relative success) to reconnect to the Internet has put into the spotlight the tangled …
Facebook “password reset” scam hits inboxes
Yet another “password reset” scam has been hitting the inboxes of Facebook users lately, warns McAfee: The email contains a zipped file that supposedly contains …
Barclays under strong phishing shower
A highly productive phishing scam, with more than 180 messages sent in three minutes, hits a big chunk of the online segment of Barclays members Various people are wondering …
Malware through hardware still around
Following the security fiasco that was the shipping of a HTC Magic phone complete with pre-installed malware, one would think that Vodafone could come up with a better excuse …
Rogue software details: DoubleVaccine
DoubleVaccine is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
1 in 4 kids have tried hacking
Despite 78% agreeing that it is wrong, 1 in 4 of UK’s children have tried their hand at hacking into others’ Facebook accounts mostly by surreptitiously using the …
Malicious ads on email service lead to malware
If you haven’t yet disabled JavaScript on your browsers, it’s high time to do it. TrendLabs warns about malicious advertisements popping up for users visiting a …
Rogue software details: Antivirus 7
Antivirus 7 is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\Desktop\Antivirus7.lnk …
Feds on social networks: What can they do?
Should law enforcement agents be allowed to go “undercover” on social networks and collect information about the suspects? In the real, physical world, they …
20 critical Apple vulnerabilities to be revealed
Charlie Miller, the security researcher renowned for hacking Apple products during many a hacking competition, will be making public (at the CanSecWest security conference …
Enterprise 2.0 privacy concerns in Europe
Transparent access to people and information is Enterprise 2.0’s great promise. It’s tempered, however, by a privacy risk that is especially sensitive in the …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations