Popular online services graded on SSL implementation
It seems that Firesheep has succeeded where similar tools have failed in the past: the issue of full end-to-end encryption for all websites – especially the most popular …
Perverted Facebook hacker targeted women
The recent arrest of a 23-year-old California man that has allegedly hacked e-mail accounts of more than 170 women and posted sexually explicit pictures found within them to …
New deep packet analysis technology
NetScout Systems announced Adaptive Session Intelligence (ASI) technology, a transformative real-time Deep Packet Analysis (DPA) engine that allows both enterprises and …
Google Android vulnerabilities
A shocking number of high-risk security flaws in Google’s Android smartphone OS have recently been discovered by security firm Coverity. “We found 88 high-risk …
Fake USAA e-mails phishing for card information
E-mails purportedly sent by the United States Automobile Association (USAA) have been hitting inboxes in the last few days, M86 researchers warn. In it, the recipients are …
Measure, visualize and understand WLAN clients
AirMagnet released n (including the AirMagnet Planner module) and AirMagnet WiFi Analyzer PRO 9.0. Both products now include the company’s new multi-adapter solution, …
End-to-end data security
RSA announced its RSA Data Protection Manager product which combines tokenization and application encryption, two popular application-based controls, with advanced token and …
Human rights organization targeted with cyber attack
The website of Survival International – a human rights organization that campaigns for the rights of indigenous tribal peoples – has been knocked offline last week …
The aftermath of the Bredolab botnet shutdown
The war against botnets will be long and hard – there is no doubt about it. For one thing, command and control centers can be replaced and the targeted botnet …
Fake AV pushers poison US election search results
The US midterm elections are taking place today, and scareware pushers aren’t sitting with their hands crossed – they have poisoned related search results: Search …
Protect login credentials with key stroke encryption
SutiSoft released SutiKSE, a security solution that protects data being entered on the keyboard. The solution helps protect against keylogging software and malware threats …
Smartphone security and privacy protection
With the rapid adoption of smartphones, concerns about security and privacy of data on the phone are increasing. Consumers realize that they have an extensive amount of …
Featured news
Resources
Don't miss
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
- Microsoft 365 users targeted in device code phishing attacks
- More than half of public vulnerabilities bypass leading WAFs
- The soft underbelly of space isn’t in orbit, it’s on the ground