The lazy programmer’s guide to secure computing
This presentation starts with a simple block of code written by the Lazy Programmer, to observe how laziness made the code more compact and simpler. We then define the …
Apache.org hit by XSS, bruteforce attack
The Apache Software Foundation is the latest victim of a targeted attack aimed at its infrastructure – more specifically, at the SliceHost server (brutus.apache.org) …
Google’s priorities: Security and mobility
The future of computing is mobile. This statement has been repeated time and again by many people in the computer industry, and yesterday was Eric Schmidt’s turn to say …
10 online safety tips
Parents and teachers should avoid overlooking the dangers associated with the Web and the risks they pose to children. Kids today are fascinated by the Internet and extremely …
Medical records secured by code-changing algorithm
Medical records databases are a treasure trove for researchers – mapping trends in diseases and studying them to discover better treatment methods has never been easier. …
New Data Loss Prevention solution from CheckPoint
Check Point announced its new network-based Data Loss Prevention (DLP) solution that helps businesses move data loss from detection to prevention by pre-emptively protecting …
Future air travel security risks, privacy and social implications
The European Network and Information Security Agency (ENISA) has analyzed the risks associated with a future air travel scenario, enabled with “Internet of …
President’s death used for fake AV peddling
Scammers are taking advantage of the people’s interest in the news of the tragic death of Poland’s President Lech Kaczynski to peddle their fake AV software. By …
Farm Town players targeted by malvertisements?
Players of the popular Facebook game application Farm Town are warned not to fall for the fake security warnings claiming that the user is infected by a virus that pop up …
Endpoint data leak prevention still a major headache
More than one in three (38%) of respondents are still failing to deploy any form of data leak prevention, whether that be device control, endpoint DLP or DLP appliances. …
Cash extortion scheme targets BitTorrent users
BitTorrent users are targeted by an unprecedented extortion campaign that threatens them with legal action for copyright infringement, unless the pay a $400 …
WordPress hacked, affected blogs point to malware site
A throng of blogs have been compromised and are pointing readers to a malicious website containing scripts that lead to a Trojan that drops and executes other malicious files. …
Featured news
Resources
Don't miss
- Confusion and fear send people to Reddit for cybersecurity advice
- Product showcase: PrivacyHawk for iOS helps users track and remove personal data from data brokers
- Fake browser crash alerts turn Chrome extension into enterprise backdoor
- Law enforcement tracks ransomware group blamed for massive financial losses
- Global tensions are pushing cyber activity toward dangerous territory