Rogue software details: WiniFixer
WiniFixer is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
SecureCloud 2010: The future of cloud security
SecureCloud 2010 is a premier educational and networking event hosted by ENISA, the Cloud Security Alliance and ISACA, three of the leading organizations shaping the future of …
Week in review: critical IE security issues, cybercrime increase and Facebook risks
Here’s an overview of some of last week’s most interesting news and interviews: Blippy, a great service for phishers? Blippy, a new service that lets you twitter …
New Google Chrome security features
The latest release of Google Chrome has integrated five new security features that “make it easier for developers to build secure web sites,” writes Adam Barth, …
Congressional web sites defaced
Visitors of websites of some Congressional representatives and of a few committees were greeted on Wednesday evening by a short message with colorful language. The websites …
Top 5 online privacy tips
Increasingly sophisticated spam and an ever-changing array of new email-borne malware continue to have a huge impact on the growing levels of loss of sensitive and personal …
Ultra-secure USB flash drive from Kingston
Kingston released the DataTraveler 5000 USB Flash drive which is FIPS 140-2 Level 2 certified with Level 3 pending, and features 256-bit AES hardware-based encryption. The …
Critical IE security issues to be detailed at Black Hat DC 2010
At the Black Hat DC 2010 conference Core SCS Security Consultant Jorge Luis Alvarez Medina will demonstrate cutting-edge browser manipulation techniques that can allow for …
RSA Conference 2010 keynote lineup
RSA Conference 2010 announced its keynote speaker lineup for the March event in San Francisco. As interest continues to swirl around cloud computing and the popularity of …
The age of cyberwar
McAfee revealed the staggering cost and impact of cyberattacks on critical infrastructure such as electrical grids, oil and gas production, telecommunications and …
IE vulnerability offers your files to hackers
Jorge Luis Alvarez Medina, a security consultant working for Core Security, has discovered a string of vulnerabilities in Internet Explorer that make it possible for an …
Report warned about Google-like attacks
Could the attack on Google have been prevented or, at least, mitigated? The question arose when the existence of a report titled “Report on the Capability of the …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations