Privacy rights under attack
I think we can all agree about the fact that privacy has become an increasingly fluid concept with the advent of social networks. Yes, you can choose what you post, but your …
Aggressive phishing campaign spoofing Microsoft Office Outlook Web Access
An aggressive spear phishing email campaign inviting recipients to “apply a new set of settings” to their mailboxes because of a recent “security …
Your files held for ransom
F-Secure alerts about the latest scheme that tries to make you buy rogue software to “repair” your “corrupted” files. It starts when you get infected …
Rogue software details: QuickHealCleaner
QuickHealCleaner is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Ubuntu Privacy Remix 9.04r3 released
Ubuntu Privacy Remix is a modified Live-CD based on Ubuntu Linux. UPR is not intended for permanent installation on hard disk. The goal of Ubuntu Privacy Remix is to provide …
Can a router hack expose your physical location?
Remember the Samy worm? The author of the first major worm that took advantage of cross-site scripting to propagate itself all across MySpace has found and exploited another …
A closer look at CA Internet Security Suite Plus 2010
CA ISS Plus 2010 provides protection against viruses, spyware, hackers, spam, phishing and offensive websites (with Parental Controls). There is also a backup option …
Netgear releases 3G/4G/WiMAX wireless routers
Netgear announced two full-featured new routers for connecting to 3G/4G/WiMAX cellular networks. The 3G/4G Mobile Broadband Wireless-N Router (MBRN3000) combines 802.11n …
Cybersecurity expert: Job guaranteed
Computer security used to be regarded as a boring and less important field of computer science, but with the proliferation of computer threats (from malware to active attacks) …
New books: The Sustainable Network, iPhone SDK Development, VMware Cookbook
What technologies do we need to solve the complex environmental, economic, social, and political challenges facing us today? This book by Sarah Sorenson reveals that one tool …
A closer look at Symantec Security Check
Symantec Security Check is a web-based scan that combines two features: a Security Scan and Virus Detection. To use it, you will be asked to download some components and …
Cyber-liability: Importance and complexity
When the U.S. Supreme Court agreed to take the case of a California police officer who sent sexually explicit text messages on a department-issued pager, news reports …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations