Please turn on your JavaScript for this page to function normally.
Cybersecurity bill changes, US president not permitted to shut down the Internet

Six months ago, two bills regarding cybersecurity were introduced in the US senate and a lot of people objected to the possibility that the bills would allow the US president …

Should major ISPs join the fight against botnets?

The recent “de-peering” of the AS-Troyak ISP and its consequent struggle (and relative success) to reconnect to the Internet has put into the spotlight the tangled …

Facebook “password reset” scam hits inboxes

Yet another “password reset” scam has been hitting the inboxes of Facebook users lately, warns McAfee: The email contains a zipped file that supposedly contains …

Barclays under strong phishing shower

A highly productive phishing scam, with more than 180 messages sent in three minutes, hits a big chunk of the online segment of Barclays members Various people are wondering …

Malware through hardware still around

Following the security fiasco that was the shipping of a HTC Magic phone complete with pre-installed malware, one would think that Vodafone could come up with a better excuse …

Rogue software details: DoubleVaccine

DoubleVaccine is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

1 in 4 kids have tried hacking

Despite 78% agreeing that it is wrong, 1 in 4 of UK’s children have tried their hand at hacking into others’ Facebook accounts mostly by surreptitiously using the …

Malicious ads on email service lead to malware

If you haven’t yet disabled JavaScript on your browsers, it’s high time to do it. TrendLabs warns about malicious advertisements popping up for users visiting a …

Rogue software details: Antivirus 7

Antivirus 7 is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\Desktop\Antivirus7.lnk …

Feds on social networks: What can they do?

Should law enforcement agents be allowed to go “undercover” on social networks and collect information about the suspects? In the real, physical world, they …

20 critical Apple vulnerabilities to be revealed

Charlie Miller, the security researcher renowned for hacking Apple products during many a hacking competition, will be making public (at the CanSecWest security conference …

Enterprise 2.0 privacy concerns in Europe

Transparent access to people and information is Enterprise 2.0’s great promise. It’s tempered, however, by a privacy risk that is especially sensitive in the …

Don't miss

Cybersecurity news