Please turn on your JavaScript for this page to function normally.
Deep packet inspection – illegal or not?

Virgin Media’s plan to monitor traffic on its networks to assess the percentage and nature of illegal file-sharing may be soon hitting a roadblock, since Privacy …

Virus writers produce hardware damaging code?

BitDefender identified a new e-threat that combines the destructive behavior of a virus with the spreading mechanisms of a worm. There are two known variants of this virus, …

Devious ransom trojan takes data hostage

Taking data hostage is not a new invention in the world of cybercrime but a trojan currently infecting computers does it in a way that can leave the victim unaware that he has …

TechCrunch compromised by security exploit

Popular technology blog TechCrunch was compromised earlier today and their site was replaced by a message that links to a website offering assorted links to pirated material: …

Collection of penetration testing tools

Complemento is a collection of tools for penetration testing that has been included in BackTrack 4 Final LetDown is a TCP flooder that has an (experimental) userland TCP/IP …

Cybercrime increasing faster than company defenses

Cybercrime threats posed to targeted organizations are increasing faster than many organizations can combat them. Moreover, a new survey suggests the threat of cybercrime is …

Are online profiles a danger to privacy?

The rapid proliferation of the use of social networking sites among adults 45 and older increases the need for awareness and education surrounding identity theft stemming from …

New books: Beautiful Testing, Core Data, RESTful Java with JAX-RS

Beautiful Testing offers 23 essays from 27 leading testers and developers that illustrate the qualities and techniques that make testing an art. Through personal anecdotes, …

Data breach costs increase

The 2009 Ponemon Institute benchmark study examines the costs incurred by 45 organizations after experiencing a data breach. Results were not hypothetical responses; they …

Using spam to beat spam

How to make a full-proof spam filter that will not block any of the legitimate email? A team at the International Computer Science Institute in Berkeley, California, and the …

Blippy, a great service for phishers?

Blippy, a new service that lets you twitter (blipper?) your recent purchases made with a credit card of your choice, could be a valuable tool for cyber criminals, warns …

Cloud computing brings changing security risks

Cloud-based services are fast becoming established as a credible alternative to existing server-based IT solutions but organizations are failing to recognize the new security …

Don't miss

Cybersecurity news