Please turn on your JavaScript for this page to function normally.
Rogue software details: WiniFixer

WiniFixer is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

SecureCloud 2010: The future of cloud security

SecureCloud 2010 is a premier educational and networking event hosted by ENISA, the Cloud Security Alliance and ISACA, three of the leading organizations shaping the future of …

Week in review: critical IE security issues, cybercrime increase and Facebook risks

Here’s an overview of some of last week’s most interesting news and interviews: Blippy, a great service for phishers? Blippy, a new service that lets you twitter …

New Google Chrome security features

The latest release of Google Chrome has integrated five new security features that “make it easier for developers to build secure web sites,” writes Adam Barth, …

Congressional web sites defaced

Visitors of websites of some Congressional representatives and of a few committees were greeted on Wednesday evening by a short message with colorful language. The websites …

Top 5 online privacy tips

Increasingly sophisticated spam and an ever-changing array of new email-borne malware continue to have a huge impact on the growing levels of loss of sensitive and personal …

Ultra-secure USB flash drive from Kingston

Kingston released the DataTraveler 5000 USB Flash drive which is FIPS 140-2 Level 2 certified with Level 3 pending, and features 256-bit AES hardware-based encryption. The …

Critical IE security issues to be detailed at Black Hat DC 2010

At the Black Hat DC 2010 conference Core SCS Security Consultant Jorge Luis Alvarez Medina will demonstrate cutting-edge browser manipulation techniques that can allow for …

RSA Conference 2010 keynote lineup

RSA Conference 2010 announced its keynote speaker lineup for the March event in San Francisco. As interest continues to swirl around cloud computing and the popularity of …

The age of cyberwar

McAfee revealed the staggering cost and impact of cyberattacks on critical infrastructure such as electrical grids, oil and gas production, telecommunications and …

IE vulnerability offers your files to hackers

Jorge Luis Alvarez Medina, a security consultant working for Core Security, has discovered a string of vulnerabilities in Internet Explorer that make it possible for an …

Report warned about Google-like attacks

Could the attack on Google have been prevented or, at least, mitigated? The question arose when the existence of a report titled “Report on the Capability of the …

Don't miss

Cybersecurity news