Private browsing modes not as private as one might wish
The four most used web browsers – Internet Explorer, Firefox, Chrome and Safari – all have private browsing modes. Yes, they are designed to delete the most …
Rogue AV misuses VirusTotal’s name
Using well-known names and brands in order to elicit trust in potential victims is a tried-and-true technique used by online criminals, and this latest malware-pushing scheme …
Facebook virus hoax spreading rapidly
Sophos is advising Facebook users to think before passing on a virus warning that is rapidly spreading across the social network. A large number of users are currently …
Microsoft Exchange Server 2010 Best Practices
Apply best practices for administering Exchange Server 2010 and SP1 and optimize your operational efficiency. Microsoft Exchange Server 2010 Best Practices captures the …
Managed DNS Service integrate DNS, DHCP and IPAM
BlueCat Networks launched Proteus Cloud Services, a managed DNS service that provides control and central management of external DNS as well as enabling organizations to …
Facebook rolls out mobile privacy
Facebook is aware that users are becoming increasingly mobile, and to help them to change their privacy settings while on the go, privacy controls are now accessible from any …
Firefox 4.0 beta download scam on Twitter
A Twitter update hash-tagged “Firefox” spotted by Sunbelt offers a unique opportunity: follow the offered shortened link to download a cracked Mozilla Firefox 4.0 …
Fighting illegal content on the Internet
Detective Sergeant Michael Moran specializes in the domain of online child exploitation and in his address to the Institute, he focused on Interpol’s role in the fight …
How can I know if my computer is infected? 10 signs of infection
Users are often advised to use an antivirus to check if their systems are infected, but with the current cyber-crime scenario, this is simply not enough. Frequently, it takes …
ZeuS variants hide behind snatched certificates
Copying certificates from legitimate files and mimicking signatures from certificate authorities is certainly not a new tactic in the cybercriminals’ arsenal, but is one …
Remote monitoring tool for social networking activity
Awareness Technologies has expanded its WebWatcher monitoring tool for the social media platforms Facebook and MySpace. WebWatcher allows users to install the software and …
Top 5 undiscovered vulnerabilities found on enterprise networks
A report by Lumeta highlights the five most prevalent undiscovered or unknown vulnerabilities commonly found on enterprise networks. 1. Incorrect or incomplete deployments of …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform