Please turn on your JavaScript for this page to function normally.
Online banking security risks through European eID cards

A new paper by the European Network and Information Security Agency (ENISA) focuses on authentication risks with European eID Cards. It analyzes 7 vulnerabilities, identifies …

(IN)SECURE Magazine on the Amazon Kindle

Amazon’s coveted Kindle e-reader just got a firmware update that among other things, gives users the ability to read native PDF files. Naturally we had to investigate …

Macbook Air prize spam delivers malware

A good rule of thumb when it comes to unsolicited email offers or announcements should be: If it’s too good to be true, it probably is. Add to this grammatical and/or …

Cloud computing pros and cons

Cloud computing – what is it exactly and what benefits does it bring? A new white paper from ISACA describes how enterprises can achieve greater efficiencies and …

IE8 exposes sites to XSS attacks

It’s a little bit ironic when the thing that you put in place to protect you from certain attacks, it’s the thing that, in the end, makes you vulnerable to them. …

MySpace phishing and malware combo

F-Secure warns about phishing emails that urge users to update their MySpace accounts. If you fall for the trick and follow the link, you are taken to a fake MySpace page, …

Aggressive malware attack disguised as Flash player upgrade

Red Condor issued a warning about the latest spam campaign that contains a phishing ploy and a malware threat. The email requests that recipients click on a link in the body …

Mobile data security doubts

A survey of 104 enterprise mobility professionals showed that more than two thirds of European organizations surveyed are not fully aware what sensitive data is stored within …

Online financial security threats: What can we expect in 2010?

Ori Eisen, Chief Innovation Officer at 41st Parameter, highlights the top five financial security threats which emerged as the biggest money makers for fraudsters and where he …

Trend Micro blocks phishing attempt from “Trend Micro”

It must have been a special pleasure for Trend Micro to block access to the phishing URL and domain that used their name and reputation to scam people. Their analysts came …

FBI’s network against cyber crime

Last week, when the Senate’s Subcommittee on Terrorism and Homeland Security held a hearing entitled “Cybersecurity: Preventing Terrorist Attacks and Protecting …

iPhone worm turns devices into zombies

It took three weeks for someone to again take advantage of the vulnerability that leaves the owners of jailbroken iPhones exposed to attacks, and this time the attack is …

Don't miss

Cybersecurity news