UTM VPN Firewall - Vulnerability Scanner - Wifi Password Pen Test
SHOP
CLOUD
VIP
Sun Sun Sun

You are here: Home > SecPoint Blog

SecPoint Blog - Follow the latest IT Security News TV Show and news here

IT Security News RSS Feed
» IT SECURITY NEWS
 
» Is your router Vulnerable to the NetUSB or Backdoor
Is your router one of the many millions that are wide open to attack? Scan your site for free and find out....
 
» Court Rules NSA Data Bulk Collection Illegal
The NSA Phone reconnaissance program, initially unveiled by the previous NSA worker and informant of worldwide observation Edward Snowden, ruled unlawful by a New York government requests court on Thu...
 
» How to NUKE DoS your Wifi Access Point eaisly
How can you find out if your wifi access point is being attacked by remote hackers and taken down?...
 
» Signup for Free Vulnerability Scanner Webinar
Learn the latest about the Penetrator Vulnerability Scanner sign up for free Webinar...
 
» IT Security Tv News Show 12th November 2014
Watch the 12th November edition of the IT Security TV Show...
 
» Find out if you are vulnerable to Poodle Heartbleed
Free Scan to find out if you are vulnerable to Poodle, Heartbleed vulnerabilities...
 
» IT Security News Show 4th November 2014
Watch the weekly IT Security News show new edition from 4th November 2014...
 
» SecPoint IT Security News TV Show 21 October
Click to watch the latest SecPoint IT Security Weekly TV Show from 21 October...
 
» Weekly IT Security TV Show 14 October 2014
Twitter Sues Government, News on Snowden and much more...
 
» Weekly IT Security TV Show 7 October 2014
IT Security News TV show 7 October 2014...
 
» Weekly IT Security News TV Show 30 September 2014
IT Security Week TV News Show 31 September 2014...
 
» Are you vulnerable to the new Shell Shock Shell bug
New High risk vulnerability hits Linux, Mac OS X and embedded devices...
 
» Weekly IT Security News TV Show 22 September 2014
View the 22 September 2014 edition of the weekly IT Security News show ...
 
» Run 3 antivirus scanning engines at the same time
No one single Anti Virus will find all virus possible. So the cure is to run up to 3 at the same time...
 
» 10 tips for using web vulnerability scanner
Vulnerability Scanning 10 tips...
 
» 10 tips to a secure network Click to find out more
Secure your network before it is too late 10 simple tips...
 
» 10 tips to a secure Wi-Fi Close vulnerabilities clic
Wifi security Tips...
 
» Top 10 tips for using a firewall
How to use a firewall securely...
 
» 10 tips for using vulnerability scanning
Tips for Vulnerability Assessment and Vulnerability Scanning...
 
» How to Perform a Hipaa Vulnerability Scan
Hipaa vulnerability scan made easy...
 
» Major Cyber Attacks in 2014 hacking on the rise
Discover more about major Security Attacks in 2014...
 
» Hidden trick how to Super Boost Virtualization Speed
Increase easily 30-40% the speed of your Virtual machine such as Portable Penetrator with Hidden trick...
 
» Get the Best IT Security Products in Israel Local
State of the art IT Security in Israel...
 
» How to choose Vulnerability Scanning Profiles
Find out how to easily choose between 9 profiles when performing a vulnerability scan...
 
» How to submit a security vulnerability to the database
Easily submit a security vulnerability in to the database...
 
» Hyper-V Vulnerability Scanning Virtual Software Image
Microsoft Hyper-V Vulnerability Scanner Software Virtual Image...
 
» What are the weaknesses of vulnerability scanning?
Discover more about What are the weaknesses of vulnerability scanning?...
 
» Penetrator Vulnerability Scanner Helpdesk
Vulnerability Scanning Management Ticket System...
 
» Weaknesses of penetration testing
Learn more about Weaknesses of penetration testing...
 
» What are the weaknesses of UTM?
Are there any limits of a UTM Firewall Appliance...
 
» What are the weaknesses of website security?
Website Security Strength and Weaknesses...
 
» How to Perform Quarterly Vulnerability Scanning
Easily setup quarterly vulnerability scanning on your local and public networks...
 
» Difference between firewall and a UTM appliance
Do you need a Firewall or a UTM?...
 
» Differences between vulnerability assessment and vuln
Find out what the difference is on vulnerability scanning and vulnerability assessment...
 
» Difference between WPS and WPA cracking
Learn how attackers compromise WPA and WPS...
 
» Top 10 UTM Firewall functionality
Ultimate Top 10 UTM Firewall Functionality revealed...
 
» IT Meltdown faced by RBS group hitting hard Festival
Customers of Ulster bank, RBS and Natwest are severely hit by a latest IT Meltdown...
 
» Vodafone Users details hacked by Turkish hackers
According to various sources, Vodafone Iceland has been hacked, and it has left 77,000 records of various users at risk. ...
 
» Messages can crack Googles Nexus 4 and Nexus 5
A class 0 SMS can now crash a remote Google nexus phone, which has recently been published by a Dutch security expert...
 
» Game on for security experts in Estonia
In Estonia, some lucky professionals of INFOSEC will get paid to play a cyber war game, which emphasizes on a large scale cyber attack....
 
» Mark Zuckerbergs take on US government activities
Some people or organization may think that founder and creator of Facebook, ...
 
» Racingpost is facing a tough time: know more
One of the biggest and the best racing and gambling portals, racingpost.com is undergoing a security breach, which has left many of its loyal customers at risk. A recent security breach happened on Ra...
 
» A loophole in Google change password system
Google recently fixed a huge bug, which was present in Gmail’s change password system, which had the power to open up the account details of any user in front of a skilled cracker...
 
» Is your new LG TV really the spy next door?
LG recently admitted that some of its latest televisions sets have been found to log the viewing habits of its viewers, and that too without their permission...
 
» Experts Warn the Hacking of Obamacare website
Many Hackers have already tried to attack and hack the website from Obama which is on medical insurance...
 
» SSL Data Encryption to Enhance Security for Yahoo
Yahoo Incorporation has undergone the stress of malwares and Trojan Horses to be corrupting the internet systems and the offline systems too...
 
» iOS7.0.4 Launched to Curb Hacking User Accounts Sans
The Apple Incorporation has launched a new operating system, iOS7, to scrutinize the unwanted hacking. People who are anti-social elements try to hack the user name from the registered users. ...
 
» Save dolphins or face some IT security threats
A group from USA famously known as EUTNAIOA has recently warned Japanese government that they will start a series of online attacks ...
 
» Warning From Facebook to safeguard their users
Facebook is warning its users to secure their passwords, because recently some updates from adobe urged its users to subscribe to its new service, which would keep them updated regarding latest update...
 
» Switched Off or Powered Off Handsets Now Traceable
The first hand news that we all receive in the morning papers on November 13th 2013 is National Security Agency’s poised to locate the cell phones of any person for the last one thousand locations...
 
» Sabotage Focused Malwares Hit Critical Infrastructur
The posts seize critical infrastructures and their vulnerability to get affected by the atypical malwares is a serious affair...
 
» Telecommunications Cyber Crime in US! FBI finds the loop
Telecommunications Cyber Crime in US! FBI finds the loop...
 
» Offline Malware Stuxnet Hit Iranian and Russian Power
The situation if present within the systems and the situations where the malware spread is through Internet Operating Systems and servers, things look under control. ...
 
» Threat Track Security vs. Cyber Espionage! Huge Reveal
According to the recent studies from the “Threat Track (TTS) Security”, approximately six out of 10 malware system analysis at the United States the enterprises have actually investigated or have addr...
 
» New Joiners in the FBI list of Most Wanted
FBI Most wanted list consisting of more cyber criminals hackers...
 
» Apple Discloses Privacy report details
As per Apple, the maximum number of requests received is for information from law implementation departments regarding stolen or lost apple units....
 
» Ninety Eight Percent Dummy Accounts on Twitter! Beware!
Reports state, the total number of proximal sellers who are seen tracing Twitter followers on the eBay web portal has gone high from 20 in the month of June to more than 52 this November...
 
» IT Security Threat by Anonymous in Singapore!
SINGAPORE - Activist group though Anonymous have hacked the website of a newspaper “Friday” about Internet freedom in Singapore city....
 
» United States tapping Google and Yahoo Centers revealed
The Washington Post, 30th October 2013: The varied citing documents have been obtained from the former National Security Agency’s contractor Mr. Edward Snowden ...
 
» Mozilla wins by Google Inc in geo location look ups
A few times back the Google Inc. got along a fearful trouble there by recording various locations of the Wi-Fi transceivers without letting the owners know about this or without seeking permission. ...
 
» IT Security drives Bulk Hiring! Find out Where
Companies are in the hunt of IT security officials adept and well versed with cyber security systems, ...
 
» IT Security and its Optimization
Drawing to our global as well as uncompromised and independent perspectives, the dedicated teams of IT experts...
 
» Top Five IT Security Threats See if you are vulnerab
Our electronic and safety devices have formed a big space in our lives in today’s world...
 
» IT Security Obligations to mitigate risks everywhere!
The definition if the phase for varied security needs must be the first step towards the implementation of any IT security policy. ...
 
» IT Security spending reaches to $ 639 Billion 10 Yea
IT Security spending reaches to 639 Billion in just 10 years...
 
» Photos in the UK are now commercially free for all
If you are one of the many who like sharing photos online on the most popular social media networks, you are affected by this new legislation that has been passed in the UK....
 
» Government pressures companies to allow spying
Government and big companies clash regarding the issue of customer surveillance. The government is increasing pressure on communications and social media companies to find ways to comply with wiretapp...
 
» Pentagon supports troops using Chinese technology
American troops in Africa are utilizing the Apstar-7 satellite for their communication needs. The Apstar-7 is owned and managed by state-controlled China Satellite Communication Company’s subsidiary....
 
» White House sides with Privacy groups by offering
With all the opposition the Cyber Intelligence Sharing and Protection Act (CISPA), the final nail was put to its coffin when the White House stated the intent to veto it if Senate passed it into law. ...
 
» Direct 3rd party application updates not allowed
Google Play revises its terms of use to prevent mobile applications from direct 3rd party updates. Facebook is directly affected as its Android application has a silent update feature that does not go...
 
» Proposed new legislation seeks to defend e- mail
The US Senate passed a bill that requires a “probable-cause” warrant before granting access to e-mail and other private information stored in the cloud. Whether this bill will survive deliberations is...
 
» Government censorship requests are rising, reports Google
Governments are censoring more and more online content. This is what the newest Google-released transparency report revealed. Governments all over the globe have made 26 percent more requests to remov...
 
» Security Experts among others get free PR due Boston
Security firms take the opportunity to present their answers on how to prevent bombings like the one done in Boston from ever happening again while others groups take advantage of a little PR....
 
» Non-Hacker convicted of Hacking
David Nosal after a short two week trial was convicted by a law designed to prosecute hackers even though his crimes could not be considered as how traditional hacking is defined....
 
» Online Targeted Ad Escalation Imminent
Online advertisers, web browsers, and site owners fighting over how personal consumer information is used to target ads. Each group has interests that shed light on future problems that the individual...
 
» Supreme Court allows WikiLeaks Donations
Supreme Court of Iceland sideds with WikiLeaks saying it should be able to receive donations using the payment processor Visa Iceland. It warns that if the ruling is not upheld, the payment processor ...
 
» Twitter Plans to Beef up Security
Twitter is in the process of changing how users log into its service. It plans to add an additional authentication feature besides the current use of passwords. It is currently in the stage of interna...
 
» Dow fluctuates because of Tweet
A group of hackers called Syrian Electronic Army caused the Dow Jones Industrial Average to briefly drop 140 points with the use of false reports spread through a hacked Twitter account of the Associa...
 
» CISPA, A Double Edge Sword Privacy Concerns
With the new CISPA law in the US, the government can now use crowd-sourcing of cyber threat intelligence to pinpoint commonalities of cyber attacks....
 
» NSA tests Military Hacking Prowess
The National Security Agency held a four day hacking contest which it dubbed the 13th Annual Cyber Defense Exercise (CDX). The US Air Force Academy dominated the competition continuing its second year...
 
» Routers Requiring Attention Security Holes
A majority of popular router models are vulnerable to exploits and are quick to spot by hackers within a network. A security firm went out to verify and test just how vulnerable some models of routers...
 
» UK businesses frequent target of hackers
A 2013 government research report shows that in the past year, more than 80 percent of businesses in the UK have suffered breaches in cyber security. Big businesses are having the worse of it since th...
 
» 2Mbps downloads for UK by 2015
Secretary Maria Miller optimistically asserts the government project Broadband Delivery UK will be able to provide more than Britons with 2Mbits per second downloads by 2015 despite conflicting report...
 
» The Secret of Siri Revealed 2 Years developments
After the continuous prodding, Apple finally clarifies that Siri kept an archive of inquiries from its users for two whole years to help improve its services....
 
» A Picturesque but Silent Cyber war
Recently, there have been many emergency security patches being released as well as companies being targeted by cyber attacks. Efforts in company espionage continue to escalate regardless of the opera...
 
» Mysterious Malware Invades PCs All Over the UK
Thousands of British PCs are being spied upon via malware by a Big-Brother-like organization, but it remains a mystery who exactly did it and for what purpose was all this done....
 
» Your Machine Could Be Turned Into a Bitcoin-Mining
The online outlaws of the Worldwide Web are at it again, and this time around their modus operandi centers on compromising your PC so that it could serve as their slave for Bitcoin mining....
 
» Boston Marathon Bombing News Taken Advantage of by
The Boston Marathon bombing is understandably the number-one searched news item, and malware domain squatters are taking advantage of this fact in order to victimize concerned citizens who want to kno...
 
» Pirate Bay Cofounder Indicted for Hacking Plot
Gottfrid Svartholm, Pirate Bay's cofounder, has been indicted with charges of hacking that's separate from his one-year prison sentence for founding the illegal file-sharing site....
 
» Java Undergoes Critical Fix by Oracle
The database giant Oracle has issued yet another critical patch for the widely used Java code in light of what's been happening to servers making use of the app (it's presently one of the most exploit...
 
» Ex-Military Hacker Hired by Google
The US Department of Defense's clandestine military research bureau had an ex-hacker who has retired after three years of service. He has recently been hired by Google....
 
» Exposing the PayPal Bug That Exposed Privacy of Users
Security experts have released a more comprehensive report regarding the recently fixed SQL injection security hole that plagued the PayPal website a few weeks back....
 
» 4chan Used as Announcement Board for Virginia Mall
4chan exposes itself to controversy yet again as the Virginia mall shooter went ahead and announced his crime (probably via his mobile phone) way in advance on the infamous image board....
 
» Android App Brings Big Brother to Life
Big Brother is watching you... Android users. The New York Police Department is undergoing tests for an Android-based app that produces crime data and intelligence in the hands of New York patrol offi...
 
» Microsoft Issues Patch Update to Fix Patch Update
An earlier Microsoft patch caused people to have problems restarting their computer, so Microsoft had to issue a patch to patch up the patch it issued earlier in order to fix the fix of a vulnerabilit...
 
» Data Necromancy Is a New Google Feature
Postmortem data sharing is the new, latest offering of Google. The services Google offers... from Gmail to YouTube as well as Google Search... will now serve as the Ouija board for you once you kick t...
 
» Spam Has Gotten Worse in Terms of Infection Rates
Even though spam control has gotten better with the evolution of anti-spam software, spam in general has gotten worse when it comes to infection rates, according to the newest AV-Test report on the is...
 
» Fake Hewlett-Packard ScanJet Printer Messages Actually
The latest cybercriminal modus operandi apparently involves the use of spam messages containing links to malware sites disguised as fake Hewlett-Packard ScanJet Printer correspondence. ...
 
» MDOP Improves Admin Abilities on Windows 8 PCs
The Desktop Optimization Pack management features of Windows 8 has been extended and deepened. MDOP (Microsoft Desktop Optimization Pack) is a management quite for IT that deepens IT administration ca...
 
» Court Fight Exposes FBI Smartphone Surveillance Tool
Thanks to a court battle, the secrets to a smartphone surveillance instrument used by the Federal Bureau of Investigation (FBI) of the United States of America has been exposed and documented. The leg...
 
» Your Email Address May Soon Be Your Only ID Thanks
Mozilla's new service, Persona Beta, allows you to login to Yahoo! password free because it's a service that ensures your email address may be the only thing you need to serve as your digital ID for t...
 
» Another Round of Bug Squashing Happens on Microsoft
There are about nine patches issued for vulnerability fixes for Microsoft's applications for the Patch Tuesday event this April. The software conglomerate specifically locks down on privilege escalati...
 
» Windows 8 Still Has Some Kinks with Microsoft Security
Windows 8 is still having problems with propriety Microsoft security applications, which means that even though these are programs are developed by Microsoft itself, they're acting like third-party so...
 
» Israel Suffers an Onslaught of Cyber Attacks in the
The DDoS blitz of 4chan-originated hacker activist (hacktivist) group Anonymous rages on while Israel, in true form, waves off the new attack as if saying there's "nothing to see here" and whatnot, ju...
 
» True Email Privacy Might Now Be Achievable Thanks to
Encryption was not free about 22 years ago until the team of Jon Callas, Phil Zimmerman, and the PGP group made it available for mass consumption without the exorbitant price. 22 years later, and the ...
 
» Your Mobile Location Data Could Betray Your Identity
Your mobile location data could serve as a method of identifying individuals, which is why many proponents of privacy would rather the traditional, more anonymous method of mobile tracking technology....
 
» Apple Home Ground Invaded by Microsoft Developer
From June 26 to 28, 2013, San Francisco's Moscone Center will accept Microsoft to host the upcoming BUILD Developer Conference, but two weeks prior, Apple will be hosting its own WWDC. Who among the t...
 
» The Curse Word That Is Security and the Different
Security is called a curse word because of how taboo and nebulous its meaning is....
 
» Judge Says Bank Blameless for Wire Fraud Victim's Woes
The victim of a cyber heist involving a $440,000 wire fraud was denied by the judge the right to sue the involved bank, claiming that the financial institution is blameless for the crime. More to the ...
 
» SSH Cryptological Keys Ruined by NetBSD 6.0 Code Bug
A coding bug found in the NetBSD 6.0 code serves as a significant security loophole for cracker and hackers to invade the open-source operating system seemingly at will thanks to how it renders SSH te...
 
» Microsoft Insists that It Didnt Release Skype Traffi
According to Microsoft's first report on how the organization handles official data requests from authorities, law enforcement never received any user content from Microsoft's Skype subsidiary....
 
» Anonymous Mossad Leak Probably Fake and Bogus
The legion of hacktivists from 4chan known as Anonymous have claimed to leak 30,000 Israeli officer data, such as the country's secret service agency known as Mossad. Most experts agree that it's prob...
 
» Historically Huge DDoS Attack Devastates Anti-Spam
The bad guys and spammers apparently won today after what is believed to be the biggest DDoS attack ever conducted in the history of man and the Internet. The apparent victim of the attack? Spamhous, ...
 
» Uyghur and Tibetan Activists Victimized by Malicious
The highly targeted malicious software had been created to specifically target Uyghur and Tibetan activists, specifically their Android phones' contacts, phone data, geolocation, SMS messages, and cal...
 
» Java Security Vulnerabilities Anew Trouble Users in 2013
If you're in charge of business computers for your company and they contain Java, then you might be one of 94% of all computers running Java that's vulnerable to attack... specifically a Java runtime ...
 
» The Seoul Saga Malware Wipe Caused by Patching
The data wipe that happened last week in South Korea has devastated the nation. What's more, it was apparently caused by its existing network patching system; that's the reason why the malware was abl...
 
» Don't Download Pirated Android Mobile Apps Because
It's a bad idea to pirate the Android keyboard because it could be used by hackers to login into your different important accounts, like your email or your online banking systems....
 
» iForgot Password Recovery System Taken Down Thanks
For those who forget their passwords, iForgot won't be available to them, since Apple recently pulled their security system thanks to errors and possible security holes (ironically enough)....
 
» Political Intrigue Leads to CTO Boss Bugging in Hoboken
Hoboken, New Jersey IT boss faces one and a half decades in jail after it came to light that he harvested emails of the mayor and staff to serve as a leak for the mayor's political competitors....
 
» SCADA Systems and Their Vulnerabilities in Finland
Finnish security researchers have discovered that Finland could be facing a possible swarm of Internet hackers and crackers thanks to the fact that its Internet-facing SCADA (Supervisory Control and D...
 
» Medical Research Firms Have Info Stolen by Cyber Spy
Malware zombies from cyber-espionage crews have been sent to pilfer intelligence data and information from medical research firms using a variety of methods, which includes spear-phishing and other s...
 
» Malware Plague Cripples Korean Banks and Television
South Korean television and banking institutions ended up in a standstill of sorts after a network breakdown happened that disk-wiped everything in a chaotic cyber blitz. It's too early for them to po...
 
» Honeypot from SCADA Attracts International Online
Honeypot industrial systems for controlling important equipment in the energy grid, factories, and airports... that is, any critical system... suffered sustained attacks within hours by worldwide cybe...
 
» Microsofts Patch Tuesday Targets
Microsoft Patches for this month...
 
» Finger Scanners can be Fooled by Silicone Finger
Finger Scanners can be Fooled by Silicone Finger...
 
» 420,000 Node Botnet Came to Existence via Researcher
Researcher faces thousands of years in jail for good cause because the means does not justify the ends, and mapping out IPv4 Internet does not justify the questionable act of creating a 420,000 node b...
 
» Human-Like Botnet Click Scam Exposed After Researchers
The profitable Chameleon botnet fraudster was able to make a monthly take of $6 million before analysts and researchers were able to crack its code and signature. It avoided clickbomb safety protocols...
 
» Gray Hat Hacker Jailed for Hacking iPad User
Andrew Auernheimer, a gray hat hacker (a hacker that exhibits both the traits of white hat hacker penetration testers and black hat malicious crackers) is facing 41 months in prison for exposing priva...
 
» Vulnerabilities Were Exposed from Huawei USB modems
Huawei USB modem users beware, for they've been deemed vulnerable and open to attack just recently, which serves as further evidence of a long line of proof of the company's poor security practices. ...
 
» Update 10.8.3 for Apple OS X is here
10.8.3 for Apple OS X...
 
» Java security problems not going to get better
Java security problems...
 
» The Picture of Ever Worsening Situation of Cyber Crimes
Picture of Ever Worsening Situation of Crimes...
 
» A Flaw Leading to the Doom of Your Systems Security
With the launch of this month’s security updates by the Microsoft, the horrors of the root kits like ...
 
» Shares Tips to Remove Data from Mobiles
The trends of technology are changing at an exponential rate. Every day new gadgets come into market. ...
 
» Kali Linux is Released Pentesting Distribution
Finally the 6th edition of Backtrack Linux is here. This time released under the name of ‘Kali Linux’. ...
 
» Pwn2Own All browsers except Safari compromised
All browsers except Safari compromised...
 
» Windows Machines Suffering from Numerous Vulnerabilities
If you're a Windows PC user and you've been suffering because of how seemingly exploitable your machine is, it's not actually Microsoft's fault, but instead third-party programs and their software sec...
 
» $33-Million CCTV Hack Makes Oceans 11 Become Reality
In a move reminiscent of a Hollywood-style cyber heist, a CCTV hacking exploit was used in order to rob a casino blind of $33 million via high-stakes poker tournament scamming. This sophisticated sche...
 
» How deep the Android Malware issue runs
Android Malware Issue...
 
» Latest Development in NIST NVD Hacking Points Finger
Last time, it was reported that a software vulnerability was used to infect two servers of the National Vulnerability Database or NVD. It was later revealed that it the app security hole came from Ado...
 
» All Security Techniques and Models Are Doomed to Fail
No matter what security model people come up with, these are all doomed to fail because of human error and the fact that progress entails new codes, new dynamics, and new paradigms for both attackers ...
 
» Irony in the Hacking of the American National Vuln
The U.S.A's National Vulnerability Database proves itself to be vulnerable itself after it was itself attacked via malware infection and taken offline altogether....
 
» Islamic Cyber Freedom Fighters Victimizes JP Morgan
The mystery web assassination of the American bank known as JPMorgan Chase by DDoS or distributed denial-of-service attack by Islamic cyber freedom fighters is just part of a series of financial insti...
 
» Security Shop Breach Exposes PayPal Payments, Avast
The Avast security firm pulls a Pontius Pilate, washing their hands of responsibility over the breach on a German reseller website that leaked PayPal payment details from thousands of clients. ...
 
» Indian Godzilla Wreaks Havoc in the Worldwide Web
Indian "Godzilla" hacker takes down 15 Pakistani government sites as revenge and protest for suspected terrorist activity by the nation's administration....
 
» Security Holes Allow Cracker Pwn2Own Entrants 500K
Better luck next time for Oracle, Mozilla, Google, and Microsoft coders, because the annual Pwn2Own Contest had them "owned" by entrants who won $500,000 by easily cracking through their popular softw...
 
» Chinese Outsourcing Flounders Thanks to Security Fears
Security concerns plague China's efforts to acquire IT jobs from American companies the same way India had in the past thanks to cyberespionage and IT security fears. There are in fact cyber spy progr...
 
» Microsoft Updates for Windows, Internet Explorer Office
Microsoft schedules a Patch Tuesday update for the latest versions of Microsoft Windows, Microsoft Internet Explorer, and Microsoft Office applications around next week, this March 2013....
 
» The $12,000 Hacking Heist of a Lifetime by Online
A daring $12,000 hacking heist has been perpetrated by hackers. This happened after several virtual brokerage accounts for a BitCoin transaction firm had been infiltrated and emptied of its digital ca...
 
» The United States of America Is Spam Central
The USA remains the best place to send spam to, according to a study offered by Sophos. India was once the spam king, but it recently went to third place, and now the United States is now number one w...
 
» Password Protector from Japan Uses Shadow Clone
A Japanese password protector does its job in typical weird Japanese fashion, which is to flood the screen with hoax or dummy cursors to prevent shoulder surfing and screen capture password theft....
 
» Purloined Certificate Included Malicious Java Software
A stolen certificate from Clearsult Consulting is now available in Java applet malware form, which is why users must get their own Java and Oracle version updated post-haste for their own protection....
 
» China versus Japan! Jinan Cyber War Ongoing
Malware that's believed to be created by the Chinese has been deployed against the Japanese. Is the ancient tension between China and Japan resurfacing in an online battlefield?...
 
» White House Says Mobile Phone Unlocking Should Legal
According to the White House, unlocking should not be made illegal at all. They agree with the 114,000 signature petition to make unlocking legal again after the Digital Millennium Copyright Act deeme...
 
» Mediator Anonymous Convenes Against Malaysian
In an unusual turn of events, pseudo-anarchist and hacktivist 4chan group Anonymous has served as a mediator between angry hackers from the Philippines and Malaysia (which is ironic, considering the a...
 
» Google Now Ninety Nine Point Seven Percent Secure
When people go online and visit their favorite websites, they somehow expect that they (the websites) had taken the necessary steps to keep their networks safe from viruses, worms, and other types of ...
 
» DDoS Attacks in 2013 Distributed Denial of Service
Have you ever experienced not being able to access an application from your computer? In situations like this, people would often feel helpless and confused, ...
 
» China Reacted to the Mandiant Report Survalience
In the past, certain cyber attacks were launched against prominent individuals and sensitive organizations of the United States of America. Although, there was no solid proof, many people were pointin...
 
» A Stronger Computer Worm Attacked Yahoo Instant Mess
Recent studies show that the three most common malicious software programs these days are the Trojans, the viruses, and the worms. Worms? . ...
 
» McAfee and the Threats to Mobile Platforms Security
In the past, people can’t live without their PCs. It was like their whole world depended on it. ...
 
» Mandiant Intelligence Center Linked China to Recent
A lot of hacking incidents affecting the media, business, and government sectors happened in the past, and most people had thought that most of these incidents were orchestrated by hackers coming from...
 
» The Latest Hacking Attack of Anonymous Hackers Israe
In the past, Israel has been bombarded by cyber attacks coming from Anonymous Hackers. To those who just heard this term for the first time, ...
 
» The Land Down Under Is A Comfort Zone for Hackers?
Hackers strike anywhere. Although, most hackers commonly target territories in the US, Europe, and Japan, it should be noted that no country is being spared by the cyber criminals. In fact, just recen...
 
» Survey Reflected the Opinion of the People Cyber War
Humanity has experienced many kinds of war. Some were brought about by the desire to extend one’s territory like the Persian War, World War I, World War II, the Vietnam War, and the Gulf War. ...
 
» New Cyber Threat Information Sharing Bill Gathered
Just recently, Representative Mike Rogers of Michigan (Republican) and C.A. Ruppersberger of Maryland (Democrat) reintroduced the controversial cyber threat information sharing bill. ...
 
» Ransomware Group Got Busted Blackmail
Recently, the Spanish Police, in coordination with the European Cybercrime Centre (EC3) at Europol and Interpol, ...
 
» Anonymous Failed to Interrupt the 2013 State of secu
Just recently, a hacktivist organization called Anonymous made an announcement that it plans to launch Operation SATU that will prevent the web broadcast of the...
 
» Prankster Hackers Strike Again Who got Hit?
Have you seen a government warning or announcement flashed on your TV screens before? How did you feel? ...
 
» UK Needs More Skilled Individuals to Fight Hackers
These days, people often hear news about other people getting victimized by hackers. It seems that everyone is being targeted by these hackers. Attacks are rampant. We see them on news programs, we he...
 
» Some of the Best Internet Security Suites of 2013
A lot of internet security companies create security suites every year to see to it that people will have a way to defend themselves from such hacking attacks. However, there is a lot of security soft...
 
» Hackers Take Advantage of Online Dating Sites
Right now, there are a lot of online dating sites that single people can visit in order to find their special someone. ...
 
» Children Hackers Exist New Warfare Army Security
Hacking has always been one of the major issues these days. Everybody knows that it’s a crime and that it is punishable by law. However, even the law and the idea of punishment do not seem to deter so...
 
» Online Shopping Tips on the Days of the Heart Trojan
Valentine’s Day is fast approaching. It is one of the events that the hopeless romantics and the young at hearts dare not to miss. ...
 
» Secrets of the Bushes Revealed by Guccifer
Do you remember US President Bush? Which between the two – Former president George Herbert W. Bush...
 
» Fitrianta Got Eight Years ffor hacking invalid click
The judges of West Jakarta District Court (last February 5, 2013) rendered their verdict to 'Cahya Fitrianta' who was charged of many crimes which included violating the provisions of the Law of Infor...
 
» EU and Its Response to Cyber Crimes
As a response to cyber crimes, many countries now are gearing up to fight the so-called modern criminals � the cyber criminals. ...
 
» Obama and the Cyber Warriors hacker attacks army
Cyber attacks now are very common. Japan, just recently held a contest to find the best hackers they have to counteract future cyber attacks that would be launched against them. US institutions and ag...
 
» Trojans Most Common Malware Infection Are you hit?
Pandalabs (previously called Panda Software and a computer security company founded in 1990) released a report about data pilfering, hacking attacks and cyber wars...
 
» Japanese Government Sponsored A Hacking Contest
Hacking has always had a negative connotation. Any why not? ...
 
» A Call to Change US Cyber Crime Law
In 1984, in response to the growing instances of computer hacking and identity theft incidents that happened in the US, the US Congress passed a bill that would lessen if not totally eradicate hackin...
 
» Schrooten Got 12 Year Jail Time
Last February 1, a Dutch citizen was sentenced to prison for 12 years by US District Judge Ricardo S . Martinez. Unlike any other criminals , David Benjamin Schrooten is a modern day felon. ...
 
» Hackers Attacked US DOE Confidential Info Leaks
It is known to everyone that a series of hacking attacks was launched by an unknown group of cybercriminals against some of United State’s major companies. These attacks targeted the systems of The Ne...
 
» New Botnet Threats in Latin America
Digital Cyber attacks on crime that is committed and yet very few get arrested. This happens not because no one is arresting them, but because cyber criminals are also computer geniuses who can develo...
 
» Twitter Social Network : Recent Victim of Hackers
Do you have a Twitter account? Have you been recently asked by Twitter to log in a new username and password? Were all you log in details totally reset? If you answered YES to all these questions, t...
 
» Laptop docking stations may not be as safe as you imagined
In the business world the most important tool is information. The difference between having it and not having it can be the difference between success and going bust. That is why corporations invest a...
 
» U.S. media under cyber attack foregin hackers attack
Today cyber-attacks have become something ordinary and we got so accustomed to them that we no longer pay attention to them. But when the cyber-attacks focus on a public institution or an important bu...
 
» 50 Million Various Devices At Risk Due to Flaws in The Sec
The UPnP is having security issues because of the networking and routers. This is causing problems for users when they buy new devices such as laptops, printers, and other electronic devices...
 
» 16,000 Credentials From Facebook Have Been Robbed
There have been thousands of people that have found credentials mssing from their Facebook page and this is causing issues because hackers are finding ways to get into accounts....
 
» Stoke-on-Trent City Council Punished for Privacy Gaffe
Thanks to a blunder by the Stoke-on-Trent City Council's legal department, it's now facing a £120,000 fine for emailing sensitive information to the wrong person. ...
 
» French Euromillions Website Hacked by Religious Type
Around October 27 to 28, the "Moroccanghosts" hacking crew decried the French lottery website Euromillions as a den of sin and depravity that does the work of the devil....
 
» Fraudster Claiming Ownership of Facebook Arrested
Paul Ceglia, a person who claims half-ownership of Mark Zuckerberg's social network giant Facebook, has now been charged with the crime of fraud. ...
 
» The Future of Software Is in Non-Volatile Memory
There's a new memory technology out there that makes it possible for software to be stored in a non-volatile memory (NVM) format. It is system memory and mass storage in one....
 
» DVD Cracking and Console Modding Legalization Denied
Copyright holders have denied proposals last week in regards to making DVD cracking and jailbreaking video game consoles legal....
 
» No One Is Safe: The Barnes & Noble Keypad PIN Hack
Just this Wednesday, it was revealed that customer bank card data was stolen directly from Barnes & Noble thanks to a keypad PIN hack security breach....
 
» Mobile Technology Changes the Face of Cybercrime
A mobile malware alert has been posted by the Federal Bureau of Investigation (FBI), which shows that even tablets and smartphones aren't immune to the online outlaw menace....
 
» Spying Tweets and Facebook Updates
A South African company has come up with a software application that's capable of gathering public online information that will help clue them in on the goings-on with a company or a person....
 
» Spammer-Seized Money Donated to CSI Lab by Facebook
A cyber crime scene investigation (CSI) laboratory has received a significant donation from Facebook, which the latter seized from the ill-gotten wealth of spammers....
 
» Government URL Shortener Service Abused by Spammers
Work-at-home scam spammers are using and abusing a URL shortener in order to go about their questionable business....
 
» Killer Laptop Hack Against Pacemakers
Certain types of pacemakers have the ability to deliver a deadly shock to its owner, which can be induced via remote laptop or mobile device hack attacks by a hacker as far as 50 feet away....
 
» Robotic Calling Cash Reward of $50,000 by the FTC
The Federal Trade Commission (FTC) has offered a reward amounting to $50,000 to anyone who can come up with a solution that will block robotic calling permanently....
 
» The Truth about Passwords and Security
Security isn't just about two-factor authentication, antivirus software, and strong encryption of your password. It instead mainly involves the human factor towards security....
 
» SSL Vulnerabilities Remain with Certain Android Apps
German security researchers recently uncovered that many popular Android applications posses some quite serious and critical SSL vulnerabilities that need addressing post-haste. ...
 
» Is the United States Hypocritical about Cyber Terrorism?
The warnings of Leon Panetta, the U.S. Secretary of Defense, in regards to an Internet version of the September 11 attacks seem quite hypocritical in light of the U.S.'s own cyber sins, says a securit...
 
» Anonymous Affiliate Takes Down HSBC Websites
Around Thursday night yesterday, Fawkes Security... a group linked with the infamous hacktivists known as Anonymous... hacked and hijacked HSBC websites using a packet flood DDoS....
 
» Adobe Reader and Acrobat Now with Bolstered Security
Adobe has improved upon the security of the Adobe Reader and Acrobat XI with the inclusion of new sandbox protection features....
 
» BEAST Attack Still Capable of Taking Down SSL Servers
Even though a year has already passed, SSL servers as well as about 70% of all sites still cannot thwart the threat of a JavaScript-based BEAST attack....
 
» High-Bandwidth DDoS Attacks Are More Common today
High-bandwidth distributed denial-of-service (DDoS) attacks are more common nowadays than before, according to a security firm. ...
 
» $400,000 Bank of America Heist Done by Online Outlaws
A now-frozen account used to pay the wages of Washington government workers had nearly half a million dollars stolen from it thanks to cyber criminals....
 
» SMS PPI Spam Scam Blight Hitting the Mobile Phone World
A Payment Protection Insurance (PPI) scam that's sent via SMS is now recognized as the number one SMS spam-based scam around by AdaptiveMobile. ...
 
» Anonymous Hacker Group Cuts Support of Wikileaks
The Anonymous hacking group has cut all ties with Wikileaks and its founder, Julian Assange....
 
» Over 9,000 Cyber Criminals Arrested in China
China recently arrested about 700 crime gangs and over 9,000 cyber criminals in order to stop a PR racket to censor criticism and user-generated negative content ...
 
» Sony Pictures Hack Perpetrated by LulzSec Hacker
Raynaldo Rivera, a LulzSec hacker, pleaded guilty in regards to his involvement in the hack attack of the Sony Pictures Entertainment website back in May 2011....
 
» Information Technology Industry Supports Obama
The tech industry puts its money where its mouth is and provides donations to the Obama reelection campaign....
 
» Should Bounty-Hunting Bug Finders Be Regulated?
Experts cannot come up with a consensus regarding whether or not bounty-hunting white hat hackers searching for vulnerabilities should be regulated....
 
» US Defense Secretary Warns Future Cyber Attacks 911
The US Secretary of Defense alleges that future cyber attacks on American soil could rival the 9-11 terrorist bombings of the World Trade Center back in 2001. ...
 
» Displaced Vendors in Cloud-Computing-Dominated IT
Vendors are currently feeling out of place in the Information Technology field thanks to cloud computing....
 
» Skype Worm Has a Scarily Smart AI
The latest Skype worm is able to infect Skype installations worldwide by chatting users up before holding their computers hostage....
 
» Pirate Bay Founders Go MIA During Conference
Even though they're due to speak on Wednesday, Pirate Bay founders were found missing in action at a Kuala Lumpur Hack in the Box Security Conference talk....
 
» Small Business Are Not Taking Advantage of Mobile
A survey reveals that even though small businesses require the help of mobile device management solutions, they remain ignorant of them. ...
 
» Adobe Flash Patching Underway for Microsoft IE 10
The newest Adobe Flash update contains 25 important vulnerability fixes, which is why Google and Microsoft applied these patches to their browsers post-haste....
 
» Malware Infection Rate for Windows 7 Rises Dramatically
The malware infection rates for the Windows 7 operating system have risen significantly for 2012. ...
 
» Philippine Government Sites Hacked Because of Anti
Because of concerns regarding the restriction of freedom of speech via the anti-cybercrime law, Anonymous Philippines has launched hacker attacks to Philippine government websites....
 
» Telemarketer Computer Scammers Caught Red-Handed
The Federal Trade Commission or FTC is currently targeting scammers that use scare tactics to cheat consumers of thousands of dollars by pretending to fix their computers. ...
 
» IBM corrects security report after criticism from Google
After revisiting their statistics, it turns out Google has no more critical security issues. ...
 
» QuickTime found to be vulnerable to Code-execution exploit
All because of human error, Apple QuickTime is still at risk....
 
» Hackers give Microsoft advance warning before attack
Even Hackers make mistakes. ...
 
» Criminals continue DLL hijacking as developers Striv
Developers slowly addressing DLL hijacking vulnerability as Microsoft shares SDL knowledge and its DLL administrative tool....
 
» Pushdo botnet Power diminishes to almost nothing
Pushdo spam slowly disappearing from e-mail boxes....
 
» Pentagon improves its cyberspace security measures
Due to a wide spread malware incident 2 years ago, Pentagon implements a better cyber-security policy....
 
» Microsoft specialists refute Apple's privacy policy
The privacy of end-users will be indirectly exposed. ...
 
» Microsoft admits existence of application code-execution bug
Microsoft admits IT Security Vulnerability...
 
» Speedport router WPA key a disappointment
Speedport W700V routers default security easily compromised...
 
» Halo: Reached earlier than expected
Leaked right under the nose of the Xbox Market...
 
» New tricks malware use to catch you off-guard
A new program that get you to uninstall your antivirus software for them to do their dirty work....
 
» Code-execution bug terrorizes Windows
Code-execution bug reaps terror on Windows applications....
 
» More secure VLC Media Player 1.1.3 released
The new VLC media player protects you from a security vulnerability affecting media players. ...
 
» Studies show that Security Suites are getting left behind
Do antivirus companies really protect your computer? Find out how well they performed during testing....
 
» Rivalry in the Warez Market Illegal Software Downloa
Hackers fight over warez forums. Sensitive data used as ammunition...
 
» Cybercriminals get hacked Even Hackers hacked
What goes around comes around, it seems. Criminals included....
 
» Lawsuit filed against Warner, Disney, and others
Lawsuits related to issues of privacy in the net have been filed against Clearspring Technologies and its clients which include well known companies....
 
» Gift-card cloner on probation easily duplicate cards
Retailer stores, be extra wary!...
 
» New wheels reveal vehicles location
Tire pressure sensors in vehicles don't use encryption which makes it open for attack...
 
» Overlooked security bug in Facebook patched
500 million users of Facebook can now sigh in relief after a overlooked security bug was fixed....
 
» NoScript misunderstood while XSS dominates websites
Most users are trading security over convenience when accessing the internet....
 
» Dot-Matrix Printers insecure? How do hackers attack
Who knew the noise it makes reveals more than it should? ...
 
» VxWork module creates security hole in networks
Operating system two modules causes Security risk to networks....
 
» Thunderbird roasting in its own juices
Developers need to step up their game to get more competitive with other e-mail clients ...
 
» Russian Hacker extradited and put on trial
Alleged ring leader extradited for stealing $9M worth of funds from RBS WorldPay...
 
» Fake Facebook virus more troublesome than real one
Fake Facebook virus messages spamming Facebook users. Stop spreading this to your friends....
 
» IPv6 Security Dillema Fortold at DefCon
New system causes New Problems and provides new answers. IPv6 coming soon!...
 
» Cracking software can gain access to iPhone 4 passwords
Now there is no need to jailbreak iPhone 4....
 
» Company payroll not immune to hackers
A pharmaceutical company that uses a third party payroll system was hacked, placing the payroll of employees at risk....
 
» Adobe Reader still plagued with security flaws
Even the iPhone is not safe with this PDF Reader. Adobe needs to roll out more security fixes....
 
» Fool-proof cryptography coming soon!
Securely send encrypted messages only to a specific place!...
 
» Rootkits target Android devices
New rootkit demonstrated to affect Android phones. Beware!...
 
» Promised critical Microsoft patch rolled out
Microsoft Security Patch was deployed as promised....
 
» UK radio waves opened up for public scrutiny
UK Radio waves opened up for public scrutiny? Still, some secrets should be kept. Radio license database soon to be open to the public in 2011. Operators get ready!...
 
» Cell phone call cracked like an egg
GSM Cellphone Security in Germany is in jeopardy! Better security measures needed....
 
» Virtual security progresses in the market
Virtual security takes it lead and will flourish in the year 2014....
 
» Apple improves the security of its popular products
Security of the Apple products are to be upgraded with the recently-released patches....
 
» Testing rules improved by the anti-malware officials
The anti-malware governing body deided to improve the testing principles so as to have advanced security testers....
 
» Criminal attempts frame-up and failed
A vicious criminal attempted to do hacking but met his ultimate failure....
 
» Amplify call center payment security, says Veritape
Security in the call centers of UK can now be tightened up with the vendor's newest product....
 
» Web giant appears with a come back
The agency requests for an explanation and the giant returns with a detailed reply....
 
» Humyo now owned by Trend Micro Anti Virus Click Info
Cloud technology is now a big hit....
 
» Ubuntu versus Windows and the former wins
Ubuntu is now the leading product based on consumers' opinions....
 
» World Cup malware rampages in the web says Symantec
The World Cup theme is now overused as criminals continue to use this in compromising many computer systems....
 
» Eleven Chrome vulnerabilities now updated
Another upgrade were done by the web giant as a response to the concern over the security of users....
 
» E-mail addresses divulged with breach on iPad's security
E-mail addresses were divulged but this occurred only with a small glitch....
 
» Wi-Fi data gathering done with intention
Google rejected the idea that they gathered Wi-Fi with intentions but Privacy International thinks otherwise....
 
» Botnet master lead the death of its own creation
The creator had no choice but used his last resort and he ended up destroying his latest masterpiece....
 
» Exploit on XP carried out by Google employee
Protocol was bypassed when the Google engineer distributed the information about a Microsoft vulnerability before informing the company....
 
» Amplified security as Twitter cuts URLs short
Twitter created a new method in order to protect their users and this works by shortening the URLs being posted....
 
» Group of SMS scammers in Malaysia now arrested
Lottery scam is the common method used by vicious. Fortunately, the group that used this in Malaysia was recently caught by the police....
 
» Doctor Who game bears an astonishing treat
Downloading game from P2P networks can actually bring danger....
 
» Virtualized desktop now on Trend Micros hands
There should always be a room for technological advancements....
 
» Bangladesh Facebook, rolling in the web again
Posting an offending photo will cause the ban of the social network in Bangladesh....
 
» Serious glitch detected on Adobe products
New threat was found on the Adobe products but some things may be done in order to prevent larger problems....
 
» New spam masquerades as Twitter-related mail
A spam message was found to have been circulating through webmails and this allows download of fake antivirus program....
 
» Web giant focuses on security processes
It is the time for the web giant to prove the others wrong....
 
» Additional installment in Twilight saga may intensify attacks
A new book from the "Twilight" series will be released but it comes with a catch....
 
» Panda cloud security product goes commercial
Paying for a product will surely give more advantage....
 
» Samsung Wave handed out with Trojans creeping around
The popular company Samsung failed in some ways when they accidentally distributed handsets wherein the microSD cards were infected with a Trojan....
 
» Privacy endangered after a company was hacked
Greatest bidder takes all....
 
» No punishment for the instigators of Mariposa botnet
Punishment for the Mariposa instigators is not yet clear even if there were evidences presented....
 
» Security software found with tiny bugs
Even security programs can be have little vulnerability of its own....
 
» Microsoft defended the security of Windows OS
Microsoft quickly made a come back just after the allegations made against Windows OS....
 
» Facebook haunted by click-jacking worm once again
The popular social network experienced yet another round of click-jacking attack....
 
» Quit Facebook Day equals big fail
The scheduled "Quit Facebook Day" turned out to be a big failure when not too many people deactivated their accounts....
 
» Windows Mobile game infected with Trojan
The popular Windows Mobile game was found to have been infected with a Trojan and this infection continues to spread all throughout the web....
 
» Scammers prepare for another World-Cup-based attack
Scammers are again using the FIFA World Cup in order to spread terror in the web once again....
 
» Web giant plans to ditch Microsoft Corp.
Google is planning to replace Microsoft's Windows OS with another of either Linux or Mac....
 
» Over 26,000 Facebook users prepared to retire today
Quit Facebook Day was scheduled today but the social network did not believe that a lot of people will be joining the movement....
 
» 450,000 US dollar worth of money ripped off by five
Five men were found to have stolen quite an amount of money from a city and there was already a file charged against them....
 
» Hundred-million-dollar scareware criminals charged
The three men who were found to be accountable for the 100-million-US dollar worth of scareware are now charged and punishments are already settled....
 
» 1,000 cases of data breach recorded by ICO
About thousands of cases of data breach were recorded by ICO and the organization devised a plan in order to prevent further damages....
 
» ICO exploited on the distribution of phony e-mails
Information Commissioner's Office was used in another set of e-mail scams in the web....
 
» Twitter dominated by unknown Twitter attackers
The Twitter account of the large oil company was hacked while in the midst of criticism from the oil spillage in the Gulf....
 
» Advancement of privacy systems called for by EU
EU asked the three big companies to provide a more advanced systems in user privacy....
 
» United Kingdom-based employment websites assaulted
Many of the employment websites handled by Trinity Mirror Group experienced an incident of hacking. However, the group still has know idea of how it began....
 
» Famous companies offer service at a weekend event
Different companies in the IT industry will join hands in order to find the perfect solutions to the web-related problems worldwide....
 
» Expert infected its own gadget with a virus
Famous scientist conducted an in-depth study about the advantages and disadvantages of the RFID chips....
 
» Intensified security for the smaller industries from Symantec
Small to medium-sized business groups are mostly the targets of online crooks nowadays. Hence, Symantec created a product that will protect their websites from danger....
 
» Second man found guilty on DDoS attacks
Another individual was found guilty on a case of DDoS attack online....
 
» Rent out a botnet in the market only pounds 5.99
Shutting down online applications of various groups become easier since there are cheap botnets available on the web....
 
» New form of phishing attack is unveiled
Ensure safety by using one browser at a time. Too many browsers will lead one to danger....
 
» Click-jacking worm scares Facebook users
A new type of worm was found and is currently frightening the users of the large social networking website, Faceboo....
 
» Fake Facebook application fools more users
The Facebook users were tricked on Saturday by an application coated with an interesting video....
 
» Unauthorized individuals erase Facebook friends with ease
Facebook is once again the center of complaints as friends in the contact lists of the users disappear without consent....
 
» Twitter opposes any legal action against its users
Twitter said that it would not comply with the legal demand for revealing the identities of itwo of ts users as this will become a violation of an individual's rights....
 
» Facebook conspires with advertisers against users
It was found out that the advertisers are communicating with the social network service Facebook in order to gather information about the users....
 
» Infected USB drives distributed by IBM
IBM distributed malware-containing USB drives during a conference but the company quickly sent out e-mails of apology and instructions for system disinfection....
 
» UKs ICO handed professional advice to Google
ICO suggests that Google deletes all its stored Wi-Fi data but other groups believe otherwise....
 
» ISP supporting child pornography permanently disabled
After months of court trial, the ISP supporting child pornography finally received the verdict....
 
» MySpace aims for the best security
MySpace wanted to set its image apart from the rival company and the administrator did just that by making big adjustments on their security system....
 
» Facebook rushed to fix the newly-founded glitch
A week just passed and Facebook faces another challenge when the engineers of this social networking site found another security vulnerability....
 
» Rise in the malware attacks stabilizes
Recent study shows that the rise in the number of malware attacks during the past months has been stabilized....
 
» Distinctive user identifiers discovered in web browsers
It was discovered by the EFF experts that unique configurations must always be applied on web browsers to avoid the digital fingerprints left when viewing web pages....
 
» DDoS attacks now instigated by servers
Attacks are now more intense as servers become the leading distributor of the DDoS....
 
» Illegal construction of database spotted
Producing a large database using the newest infrastructure truly violated the rights of the citizens....
 
» Google pledges full security on privacy
Google, even through several security complaints, managed to present to its users the promise for full protection....
 
» Device that checks bugs in plug-ins from Mozilla
Mozilla improved its tool in order to extend help to the users of other web browsers....
 
» Bug gives users permission to assign followers
Users abuse a bug once they gain knowledge of it....
 
» New glitch spotted on Apple Safari
New glitch was found in the Safari browser for Apple operating system and this allows activation of code by abusive criminals....
 
» FIFA spam spreads terror in the web once again
The theme of FIFA is used by the online criminals once again in order to spread large volume of spam mails....
 
» Email 2.0 moves with the net towards the new age
The systems of the webmail must be upgraded in order to gain the trust of the online users today....
 
» Lack of adequate knowledge leads to Linux abuse
Users who do not know how to handle their Linux computers will most likely become victims to malicious attacks by online criminals....
 
» Latest breed of threat avoids the watchful protections
New methods were discovered by the software security experts and these allows entry into a system without being detected by the anti-virus programs....
 
» ISP receives $2.6M as compensation for spam flood
There will be a corresponding amount of money as fine for every spam mails received by a winning plaintiff....
 
» Fix for two security holes on Microsofts May update
Two new security holes will be fixed on Microsoft's scheduled update on May 11....
 
» Widespread DOS, a caution from VeriSign
There are multiple reports about the rampan DDoS attacks and users are told about the necessary actions in order to protect their systems....
 
» User privacy in Facebook endangered by the new bug
Facebook experienced a glitch on Wednesday but it was quickly fixed after the managers receive a report....
 
» Facebook users pay no heed to security controls
Facebook users are the ones who put themselves in danger by not using what is already offered to them....
 
» Online shop spamming about Viagra at Twitter
A Twitter account was constantly online during the past month and it was able to distribute links to drugs stores that sell Viagra and other medications that require prescription....
 
» Developers act as online crooks through Google lessons
Google released another tutorial that allows ordinary developers to have an experience of how it is like to be a hacker....
 
» Anti-spam tools went through a bout of function test
Different anti-spam tools underwent a test in order to check its capabilites and only a few did not pass the examination....
 
» Unlock 3G in iPad with an all new jailbreak program
A new jailbreak application was developed and it allows turning an iPhone into 3G modem. According to Apple, however, this application may have negative results....
 
» Cyber Security Challenge UK encounters slipups
Few days after the launch of Cyber Security Challenge UK, the website encountered security threats but it was instantly remedied....
 
» Latest Opera patch for Microsoft and Apple ready for use
Opera browser patch now available for both the Windows and Apple users....
 
» Online safety: major topic of government conference
A conference will be held on Tuesday and various influential guests will speak about how cybercrimes may be fought....
 
» Cross-site scripting error discovered by Microsoft
A hole was found in the components of the SharePoint products. However, no evident attacks with the use of the vulnerability was heard of....
 
» Case closed on the theft by an IT consultant
The IT consultant responsible for the theft in a bank received his 63 months of imprisonment on Wednesday....
 
» Stronger European campaign for data protection advocated
Determination can never stand alone and a well-planned schemes must be worked on for stronger data protection....
 
» Hacker of Sarah Palins webmail sentenced
David Kernell, the college student who accessed Palin's Yahoo! Mail account was already sentenced and he will serve 21 years in prison....
 
» Study for cloud computing now with European Unions
Later in time, information security will really have to creat research on new topics that include cloud computing....
 
» PDF files used for worm transportation on Windows
Online criminals create more active worms that are now endangering Windows-operated computers....
 
» United Kingdom raced with the twelve spamming countries
Many spam mails are being distributed in various webmail accounts and most of them are from the Sopho's list of the 12 notorious countries....
 
» Texas resident admits to botnet teaching
The mastermind in creating botnet software plead guilty on the case that was filed against him....
 
» Phony anti-virus programs go berserk, Google reported
Phony anti-virus programs are spreading through the online community and many users already fell for the sweet traps....
 
» Storm botnet, revived and now causing panic
Storm botnet died long ago and it is now running wild once again as it was revived....
 
» Backdoor malwares are now aiming at the iPad owners
Backdoor malwares are on the loose as these target the owners of the newly-released iPad....
 
» McAfee agrees to pay for their users' expenses
Computers of the McAfee users were damaged by their recent update and the company plans to pay back the amount of money spent....
 
» Credit card details found to be distributed by Blippy
Blippy was found to have been distributing credit card details through search engines. However, the administration denied the fact and defended that this only happened during the beta test....
 
» Week of events that gave impact to various sectors
Last week had been both good and bad for different sectors of the internet community. Most sectors, however, were plagued with the unwanted attacks from the vicious online hackers....
 
» Security firms plan to educate against phishing attacks
A group of concerned people believes that it is the right time to teach the people about safeguarding their own credit card details....
 
» MS placebo patch instantly recalled
Microsoft instantly recalled their latest update after learning that it has no use in fixing the vulnerability in their products....
 
» Android OS manipulated to function on Apple iPhones
A developer discovered that an Android OS can actually function on an Apple iPhone handset since it was created with a dual-boot system....
 
» Koobface unexpectedly appears upon shutdown HK
Battle against Koobface at Hong Kong was successful but it suddenly appeared at China just after a few weeks....
 
» XP system collapses with new McAfee patches
Complaints were sent to McAfee regarding the collapse of XP systems after the latest update from the security firm. ...
 
» Google Chrome security threats patched up
The threats that were found in the Windows-compatible Google Chrome browser were all patched up and now more convenient for the users....
 
» Cross-channel authentication in UK, now available
A valuable tool has been released by RSA Security in order to assist many groups that are in need of security against widespread cases of scam....
 
» In depth presentation of online attack methods by Akamai
Akamai wrote a report on the countries where large malicious attacks originate from. It was discovered that the attacks come from United States, Russia, and China....
 
» Appearance of latest malware on Mac OS X unveiled
A new malware was discovered and is now causing trouble among the many users of Mac OS X. However, it was also found out that this malware is actually an advanced version of the one that plagued the w...
 
» Undergraduates as new targets of UK-based fraudsters
Undergraduates and those who have loans in the Student Loans Company are the new targets of scams and frauds in UK....
 
» BobBear takes permanent leave from battling fraud
The man who has been battling fraud and helping the casualties of these scams broadcasted that he already made a decision to completely leave his post....
 
» Unalterable secret codes for Fring revealed
It was revealed that the account passwords in Fring is truly unalterable and that it causes low protection for the users of this application....
 
» Five-year-sentence handed over the TJX co-conspirator
The co-conspirator of the TJX hacking received its punishment that is lighter than that of the mastermind's penalty....
 
» Unsuccessful battle against spam by Google
Efforts were put to waste when it was found out that the amount of spam mails had only settled even after shutting down some of the prominent botnets....
 
» Blackmail tactic to trap innocent users
Web users in Japan are being targeted with the use of a dirty tactic of posting confidential data on a website and demanding for a fee on a fake infringement of copyright....
 
» MS update skips polluted systems
Microsoft's latest update contains a kernel code that avoids installation of the patch on an infected computer. This is the answer to the previous incident that scared various individuals....
 
» Netbook anti-virus software now out in the market
Netbook users need not to worry now that a new anti-virus pack has been created in order to protect the systems of the handy PCs....
 
» Abuse of Adobe Reader vulnerabilities captured
It was found out that several online crooks have already tried utilizing the security vulnerability of the Adobe Reader for the purpose of accessing computer systems....
 
» Face-off, Yahoo against governments access to webmail
Yahoo and other agencies joined hands in order to fight the access of government into private webmail accounts....
 
» iPhone unlock function faked into DNS Trojan
A new yet previously used tactic has be haunting the online community using the inviting idea of an iPhone unlock utility....
 
» Microsoft distributed 25 remedy patches for its products
Microsoft distributed 11 bulletins through their monthly update in order to fix the vulnerabilities in their products....
 
» Adobe and Oracle saved their products with latest up
Both companies Adobe and Oracle released updates so as to fix the vulnerabilities in their merchandises, which put computer systems at risk of online attacks by crooks....
 
» Patient confidentiality with the info-scrubbing algorithm
A new device was created in order to improve the protection of patient's confidential data....
 
» Heightened data protection being advocated by BSA
Business Software Alliance is campaigning for a collaboration of various entities in order to strengthen the protection of confidential information....
 
» Chinese-based hacking attack unleashed
Online attacks were found to be connected to the authorities in the country of China....
 
» Youth as Googles goal for the account safety crusade
Google created their latest security video in order to share some knowledge to the young online users regarding protection of their own accounts....
 
» Innovative privacy page for Buzz to be released
Google created the confirmation page in order to deal with the problem regarding Buzz's security issues....
 
» Vulnerability in PDF security creates tension
Security vulnerabilities were found on PDF thanks to the two separate studies done by two different security researchers....
 
» Microsoft and Apple in its week of security adjustments
The previous week was an extraordinary week for many companies. Some had become successful in upgrading their products. However, there were some who encountered unlikable events....
 
» ICO powers are now renewed and strengthened
ICO was previously underestimated by some firms as it was viewed as a powerless agency. However, new powers were bestowed upon it for a more successful implementation of data protection....
 
» Forrester suggests for a heightened social media security
According to the analyst firm, Forrester, there should be an increase in protection within social media. There are various methods that can be used in order to accomplish this kind of task....
 
» Serious glitches discovered in Java
Serious glitches were found in the two versions of Java but Oracle already has the fix for these....
 
» Firefox 3.6.3 vulnerability patched up
The vulnerability of Firefox 3.6.3 found during the Pwn2Own contest is now resolved, according to Mozilla....
 
» Security of IBM and Verizon already in the cloud
IBM and Verizon business joined hands in order to creat an efficient weapon that may be used when restoring and backing up data....
 
» Journalists are now targets of the online crooks
Webmail accounts of journalists are the newly-discovered targets of unknown online criminals....
 
» Blogs of Vietnamese protesters in the midst of danger
A new kind of trojan was discovered to be infecting downloadable keyboard drivers of the Vietnamese alphabet....
 
» Google breached the promise of privacy protection
The web giant was flooded with complaints from the users of their latest feature, Buzz. The online users found a flaw in Google's privacy policy....
 
» Hackers celebrate with every weak password they use
Symantec's recent study proved that many online users commit the most common mistakes with regards to the passwords that they use in their accounts....
 
» Update for OS X released by Apple
Apple released an update for the Leopard and Snow Leopard operating systems, which will help in improving its performance and security....
 
» Content filtering, available on DeviceLocks following update
A new version of Devicelock will be released in the market with the purpose of filtering contents being sento via the web....
 
» Trojan replaces the authentic software updates
New methods of infecting computer systems were discovered and these include trojans masquerading as genuine updates from popular companies....
 
» Emergency IE patch to be produced by Microsoft
Microsoft will release an out-of-band update in order to remedy the newly-found glitches in the Internet Explorer....
 
» Social networking sites becomes accessible to kids
Based on the latest survey, there is an evidence that more children under the required registering age utilize social networking services such as Facebook and MySpace....
 
» Malware finds another hiding spot in the tax documents
Malwares are now taking the form of tax documents in order to harm more computer systems....
 
» Malware hiding in a PDF file hassles the web
A malware was discovered to have replaced the contents of a PDF file, which was originally a guide for the well-known football competition....
 
» Close watch on net cafe customers empowered
The British police department suggests that owners of internet shops should watch their customers for any questionable move in accordance to the new plan against terrorism....
 
» Instigator of TJX hacking sentenced with 20 years
The instigator of TJX hacking is now punished with 20 years of imprisonment and an amount of fine as a compensation....
 
» Conference in Europe, officiated for the battle crim
CoE was held this week at Strasburg and the fight against cybercrime was the main concern of this event....
 
» Google says a glitch caused the Chinese biography bug
Appearance of the biography of the Google executives was caused by a bug and not done by hackers....
 
» No ill intentions says the Twitter hacker
The 23-year-old hacker of the popular micro-blogging service asserted that he had no ill intentions when he accessed the the computer system....
 
» Google promises to protect users from malicious activities
Google introduces a new feature, which will protect users from spam and attackers online....
 
» Latest version of Aviras antivirus, now available
Avira, the Germany-based manufacturer of security products, released the latest version of the AntiVir and download links are available in various download servers....
 
» McAfee grants users the answer for data loss
McAfee produced a new product, which is aimed at protecting systems from the risks of data loss....
 
» Symantec launches another security masterpiece
Symantec launches a new security product that is deemed to be helpful in fighting malware infections,...
 
» False patch ruins different branches of computer systems
The latest update of BitDefender resulted to a damage in different applications because the system files were detected to have been infected with Trojan....
 
» Google web scanner now available
Google produced another service, which helps in spotting vulnerabilities in different computer programs....
 
» Street View controversy not yet concluded
Google faces another controversy due to an uploaded photo of a young female murder victim. This caused a flood of complaints at Google....
 
» Update for Firefox 3.6 is now ready
The update for the security vulnerability of Firefox 3.6 is now available, according to a blog done by Mozilla...
 
» Penalty charged against the Virgin Mobile spamming
Virgin Mobile was charged with fine due to the many complaints sent by their customers to ACMA....
 
» Firefox remedy Mozillas month-end offering
Firefox assured its customers that their remedy patch will be released by the end of March this year....
 
» Hundred cars on standstill due to hacking
Several cars manufactured by Texas Auto Center were disabled by an ex-employee. This incident caused quite an amount of trouble to the many automobile users....
 
» Trojan takes Energizer into a tricky situation
The website of the leading producer of batteries, Energizer, was discovered to have been distributing an infected file for more than two weeks already. The company promises the users that they will fi...
 
» IE 9 no longer compatible with XP
Microsoft announced that Internet Explorer 9 can no longer be supported by Windows XP....
 
» One in every four UK students participates in hacking
According to the latest online survey, about one in every 4 youngsters in UK is participating in hacking activities....
 
» Firefox version 3.0, about to reach its conclusion
Mozilla announced that they will stop the production and updates for the Firefox version 3.0....
 
» Use of fake MySpace profiles to fight crooks
MySpace profiles are currently being used by federal agents as weapon against alleged individuals....
 
» Hazardous Facebook application scares online users
A certain Facebook application, which is a fake profile-checker, has been plaguing the users recently....
 
» Users notified against counterfeited payment card terminals
Great amount of loss was recorder due to the spread of the bogus credit card terminals in the machines of Hancock stores....
 
» New security test tool for safer online surfing
Jericho Forum created, yet, another evaluation tool for the security products....
 
» Net crime loss currently booming
As of the moment, there is a recorded increase in the financial loss due to cyber crimes....
 
» Microsoft is rushing a remedy patch for vulnerability
Microsoft is now finalizing the patch in order to fix the lapses in IE 6 and 7....
 
» China search engine to be eliminated according to Google
China-based search engine is just about to be shut down, according to Google....
 
» Street View threatens privacy of individuals
Google Street View is viewed by many individuals as a threat to security....
 
» Recommendation contest invades privacy
Netflix discontinued its recommendation contest due to privacy issues....
 
» Google Chrome is up for new tricks
Google Chrome creates a new security feature with the latest version 4.1....
 
» Sarah Palin, now ready for the witness stand
Sarah Palin, 2008 election candidate, is now ready to state her testimony about her hacked webmail account....
 
» Guessing becomes as easy as 1-2-3
Reset passwords are easy to guess according to research....
 
» New forged Windows update attacks computers
Windows updates are being faked once again to cheat online users....
 
» Twitter creates new weapon against online thieves
Twitter upgraded its security to fight phishing attacks....
 
» Security firms won against malware botnets
Security firms collaborated to fight malware botnets....
 
» Bogus anti-virus threatens the online community
Anti-virus scams are currently widespread and now threatening the internet users worldwide....
 
» Latest code-execution lurking around IE
Internet Explorer version 6 and 7 are susceptible to the recent malicious comands....
 
» Updating made easy by Windows Patch Vulnerabilities
Windows makes updating softwares trouble-free for today's internet users....
 
» Paypal halts Cryptome's operation
Cryptome's account is currently stopped by Paypal....
 
» Facebook Victimized by Erotic Clickjacking Exploit
Just three days ago, the administrators of Facebook blocked a clickjacking bug that showed images of a barely dressed woman on the profile pages of unsuspecting users....
 
» IE Zero-Day Bug Now Race Against Time
Hackers and security specialists alike are racing against each other to either exploit or patch the Internet Explorer zero-day vulnerability....
 
» Hackers of Climate Change Research Site Leave Trail
The headline-making climate change hackers have left an obvious trail for IT security investigators to follow; however, is anyone bothering to follow it?...
 
» Hacker Invaded Symantec Japan Site
Plaintext passwords were exposed from a hacked, Asia-based Symantec website care of a Blind SQL Injection cyber attack....
 
» Microsoft Admits Zero-Day Vulnerability in IE 6 and 7
Microsoft confirms that Internet Explorer versions 6 and 7 both have zero-day bugs in them. As of now, they recommend users to turn off JavaScript....
 
» Internet Explorer Takes a Knee from New Attack
Older versions of the system-integrated Internet Explorer have been turned into security liabilities thanks to a hacker attack code that specifically targets the notorious browser....
 
» Customers Blamed for E-Retailer Marketing Scam
Ecommerce marketers that have been implicated in a marketing scam of sorts are blaming the customers for the entire debacle....
 
» Ralsky Incarcerated for Four Years over Spam Fraud
The dubious career of the Spam Godfather is now sleeping with the fishes....
 
» Cyber Attackers Instigate Enormous Climate Data Hack
The data, source code, and credentials of several secretive scientists from the Climate Research Unit of the University of East Anglia have been stolen by nefarious hacker hooligans....
 
» Latest iPhone Worm Identified by ISP
The owners of jailbroken iPhones everywhere should beware, because a backdoor-installing, botnet-infecting mobile phone worm is now making its rounds in the wild....
 
» Cloud Computing Advice, Dangers, and Perks
ENISA recently published a report that outlined the pros and cons of cloud computing as well as recommendations on how to better utilize this new technology....
 
» The Anti-Cyber Crime Unit of the FBI
In a congressional hearing conducted this week, the FBI outlined how its anti-cyber crime taskforce will get the job done when it comes to IT security....
 
» Latest Internet Explorer Vulnerability Exposed
The newest Internet Explorer 8 security hole is so dangerous that it can make safe sites unsafe....
 
» Riskiest Threats to Federal Infrastructures and Systems
A new study by the Ponemon Institute recently concluded that the E-Government initiatives intended to modernize federal infrastructures are fraught with many perils....
 
» India and Its Cyber Security Awareness
The biggest India-based security conference in the history of the nation opened its doors last Tuesday in order to talk about the depth of cyber security awareness in the country to date....
 
» NSA Empowers Windows 7 Security
The National Security Agency has helped a lot in beefing up the IT security measures of Windows 7, and is now providing the same service to Red Hat, Sun Microsystems, and Apple....
 
» Security Chief and Crypto Vanguard Leaves Sun system
The veteran Chief Security Officer of Sun Microsystems and renowned crypto pioneer Whitfield Diffie had already left the software giant....
 
» Spammers Exploit Recent Swine Flu Trend
The online outlaws of Mother Russia are at it again as they distributed a spam scam that took advantage of the current swine flu panic-buying trend....
 
» 2008 Campaign Allegedly Affected by Palin Email Hack
Former GOP vice-presidential candidate Sarah Palin claims that the hijacking of her Yahoo email account is the most troublesome issue she faced during her campaign trail in 2008....
 
» SSL Renegotiation Vulnerability Exploit in Twitter
A Swiss researcher has just demonstrated how serious the Twitter SSL renegotiation vulnerability really is. ...
 
» Career Opportunities and Hate Mail Engulf iPhone
The man who created the rickrolling iPhone worm is presently deluged with both death threats and job offers because of his little malware-based practical joke. ...
 
» Report on Website Vulnerability Commonalities Released
The WhiteHat Security Report reveals that for the last three years or so, many urgent, critical, or high-level security issues continue to slowly increase over time....
 
» Adobe Flash Policy Exposed to Online Dangers
The lackadaisical security measures of Adobe Flash can and will put UGC enthusiasts into a bit of a bind, so to speak....
 
» Fed Wiretaps Susceptible to Exploits
Wiretapping can now be easily circumvented thanks to the thin bandwidth of such devices....
 
» Microsoft Functionality Patent Stolen from Unix?
Critics are complaining about the latest Microsoft functionality patent because the feature appears too much like the ones used by the Unix platform....
 
» Twitter API a Hiding Place for Exploit Websites
The Twitter API trends function has become a viable medium for hackers to conceal their dubious craft with....
 
» Wikipedia Charged for Illegal Name Disclosure of Murderer
The Wikipedia article disclosing the name of the convict for the gruesome murder of a popular German actor has caused the perpetrator to sue the online encyclopedia....
 
» The Cyber Warriors of Britain go into Battle Next Year
The online soldiers of the United Kingdom are moving onward to the cyber warfare front on March 10, 2010....
 
» Remote Kernel Crasher Code for Windows 7 Published
The code that causes print and file freeze on computers has finally been disclosed and addressed by the Microsoft Corporation....
 
» Complex Parcel Mule Scheme Exposed by RSA
The RSA has recently uncovered a Europe-based reshipping parcel mule scam that targeted U.S. citizens to work as freight-forwarding middlemen....
 
» Daily Cyber Security Hazards Federal Agencies
The CDW Government released a report that outlined the standard cyber security threats that companies face on a daily basis....
 
» Latest Apple Safari Patch Fixes Critical Security Holes
Apple has just issued several security patches for the Safari 4.0.4 web browser yesterday....
 
» The Britney Spears Twitter Invaded Once More
Last time, hackers put in a misleading message on the Twitter of singer Britney Spears. They then decided than one hack deserved another, and oops, they did it again....
 
» Spam King Lawsuit Won by Facebook
The spam lawsuit between the self-described Spam King Sanford Wallace and social networking giant Facebook had ended, with Facebook emerging as the victor. ...
 
» More Microsoft Clean Up after Record-Breaking Patch
Microsoft has followed up its impressive release of security patches just half a month ago with even more virtual bug extermination....
 
» Impending Hacker Armageddon Coming Soon
According to a report by James Lewis, the worst is yet to come for the cyber attack battlefield....
 
» Microsoft Launches Free Vulnerability Mitigating Tool
Microsoft has released a free security tool designed to lock down applications that are vulnerable to hacker attacks....
 
» Latest Firefox Corrects Serious Security Issues
The latest Firefox offering has finally addressed and fixed several critical security issues....
 
» Gizmodo Apologizes for Malware Surprise
The staffers and authors of Gizmodo were too late in spotting the hack done to their site....
 
» Rogue Trader Recommends More Intelligent Regulation
The Nick Leeson lesson for today is that better regulation will help a lot in avoiding financial disasters. ...
 
» Pitiable Password Choice and Malware Remain Greatest
According to a recent study by PhoneFactor, poor passwords and malware plagues are presently ranked as the greatest security threats facing users today....
 
» McKinnon Case Defense Tactics Criticized by Ex-FBI Officer
Ed Gibson, a former FBI officer, has heavily condemned the methods adopted by the defense team of hacker Gary McKinnon. ...
 
» Windows Mobile Troubles Rising Amidst Stiffer Competition
Because of emerging rivals, the future of the Microsoft mobile OS could be very bleak....
 
» Reinventing IT Security RSA Europe Conference
IT security is presently experiencing a bit of a renaissance and revolution nowadays thanks to trends like cloud computing and social computing....
 
» Future IT Management Trends Security Network
The continuing evolution of IT management is changing technology in a fundamental level....
 
» Ex-NASA Employee Arrested Selling Classified Informa
A top NASA scientist that assisted in the discovery of water on the moon has just been busted for leaking satellite intelligence to Israel....
 
» Education Program from the Anti-Phishing Working Group
The APWG has announced on Tuesday the deployment of their education program against the ever-growing phishing problem....
 
» The Identity Theft Survival Guide
The modern-day virtual criminal is a devious fellow that can outwit even the savviest of consumers because of his intricately done spoof sites that look just as legitimate as the real thing....
 
» The Rogue Security Program Business Model
The online outlaws of the wild, wild worldwide web have been profiting handsomely from their pay-for-performance business scheme....
 
» Data Collector Gets $275,000 Fine for Data Leak
One of the foremost collectors of client data has been mandated to pay $275,000 because it has unintentionally exposed the credentials of a multitude of consumers....
 
» Hacker Scare Tactics Help Sell Rogue Security Programs
According to the results of the Symantec Rogue Security Software Report, cyber terrorists are using scare tactics to scam users into buying their faux security programs....
 
» Social Media Use Banned by Movie Studios
Celebrities are currently being banned from using online social media like Twitter and Facebook by movie studio executives in order to avoid information leaks and the like....
 
» RSA Recently Launched Comprehensive Consulting Servi
RSA is presently offering new advisory and consultative services to assist companies in enhancing or implementing their security system operations....
 
» Software Vulnerability Hampers Brain Tumor Operation
A bug in the software of a radiation therapy device causes the system's emergency stop button to malfunction, which is why a patch had just been created for it last week....
 
» Security Headaches Caused by Social Networks iPhone
The ever-growing popularity of social networks and iPhones has been troubling many a security administrator....
 
» Data Standards for UK Call Centers Decidedly Lackadaisical
The negligence of UK call centers when it comes to purging financial account credentials recorded on phone conversations will potentially develop a dangerous reservoir of sensitive, actionable data....
 
» Newest Cain & Abel Version Now Available
The latest version of Cain & Abel (a password-retrieving program that covers the services of multiple hacking applications into a single freeware tool) has just been released....
 
» Trojan Steals $480,000 from Bank Account
Last Thursday, a notorious trojan pilfered about $480,000 from an online banking account of a Pennsylvania-based company....
 
» Email of Passenger Rights Activist Allegedly Hacked
The email of an airline passenger rights chief had supposedly been hacked by Delta Airlines, which the travel company firmly denies....
 
» Google Offers Compromised-Site Admins Malware Samples
Google has recently enhanced its existing service that offers webmasters of infected sites with malicious code samples and other important data to help with website recovery....
 
» DDoS More Affordable Thanks to Botnets
According to several security researchers, cyber crime services are now cheaper than ever before....
 
» Google Accused of Double Talk by Consumer Group
An L.A. consumer group alleges that Google is employing the double talk tactic to allay security concerns....
 
» RAND Alleges Cyber Defense Better Than Offense
According to the RAND Corporation, the U.S. should focus on defense or prosecutorial, economic, and diplomatic action instead of offense or strategic cyber warfare against hackers....
 
» Old Wal-Mart Cyber Attack Exposed
Back in 2005 and 2006, Wal-Mart became a victim of a major security breach wherein cyber terrorists siphoned their website source code and other critical information to an Eastern European computer....
 
» Sophos Launches Endpoint Security and Data Protection 9
The recently released Endpoint Security and Data Protection 9 by Sophos was developed to overcome the principal problems in using DLP: manageability, cost, and complexity....
 
» New Record in Flaw Fixes for Patch Tuesday
The Microsoft Patch Tuesday last October 13 was able to fix a record number of vulnerabilities in the different iterations of Windows OS and a multitude of programs....
 
» Trend Micro Threat Management Services Coming Soon
Trend Micro has just announced the upcoming implementation of Threat Management Services that will expose Internet dangers and feature a remediation, containment, and proactive warning system....
 
» Green Dam Showing Cracks China Censorship
The China-based Green Dam-Youth Escort censorship program is facing hurdles as targeted institutions are not installing (or are even uninstalling) the software because of its bug-filled nature....
 
» Old Pedophile Secretly Videotapes Teenagers Internet
A man in his forties posed as a seventeen-year-old teenager so that he could trick girls into performing sexual acts on camera via video chat rooms....
 
» ID Fraud Prevention Week Has Commenced
The National Identity Fraud Prevention Week started off with a bang in the United Kingdom on Monday....
 
» EU Plotting Spam Clampdown via Telecom Reform
The European Commission is presently requesting for stricter restrictions and sanctions against spammers in order to protect user privacy....
 
» Man Partly Responsible for PayPal Hacker Certificat
The account of a white-hat hacker was suspended by PayPal on Tuesday after his research was used by another hacker to publish a counterfeit SSL certificate for the payment service....
 
» Sophisticated, Revenue-Stealing Botnet Discovered
A botnet that siphons actual advertisement profits from major sites like Bing, Yahoo, and Google had just been discovered, and it is currently distributing its stolen revenue into smaller networks....
 
» America Must Now Concentrate on Critical Network Security
The United States must now focus their attention on protecting their most crucial online networks against the ever-growing perils of cyber assaults and hacker attacks....
 
» Wife of FBI Chief Bans Him from Online Banking
One of the most powerful men in American intelligence and cyber crime investigation is currently undergoing domestic surveillance....
 
» Common Passwords Still Exposed to Hacker Attacks
The Hotmail phishing attack showed that password security is still woefully ill-prepared against the simplest of hacks....
 
» The Latest Phishing Operation is Small Potatoes
The black market is currently inundated with webmail logins, so the price for that information is surprisingly low. ...
 
» The Sybase Adaptive Server Enterprise Benchmark
A security benchmark has been created for the Sybase Adaptive Server Enterprise this week....
 
» UFO Hacker Suffers Legal Setback
Gary McKinnon, who is also known as the UFO Hacker, is fighting a losing battle against his extradition to the United States....
 
» A Hundred Scammers Indicted on Global Phishing Case
Although it took the better part of two years and the cooperation of Egyptian authorities, the FBI has finally charged a hundred people of phishing-related cyber crimes....
 
» Online Outlaws Playing Hide and Seek with Prosecutors
Cyber criminals behind Internet banking trojans have begun to create fake trails to trick authorities....
 
» Major Email Providers Suffer from Phishing Scam
Do not be victimized by email phishing scams; keep on reading and find out what to do when such situations arise....
 
» Internet Banking Scam Upturn Trumps Plastic Fraud
According to the figures that the UK banking industry published last Tuesday, Internet banking scams caused 39 million pounds worth of losses in early 2009. ...
 
» Better Spyware Education Presently Needed by Businesses
A Trend Micro study recently showed that companies are currently demanding more information regarding spyware prevention and security....
 
» Guide to Scams, Hacks, and Other Online Terrors
Because Internet hoaxes have become more complicated and dangerous, Network Box has created a special guide that shows users how to be more vigilant against hoaxes, cyber attacks, and other Internet h...
 
» Wyse Thin Client Device Susceptible to Exploit Vulns
A famous slimmed-down client gadget used by Fortune 100 companies, military contractors, and nuclear labs has been discovered to be weak against exploits, which puts whole multitudes of the appliances...
 
» Lack of Security Measures Threatens NHS Hospitals
According to More4 News, NHS hospitals are presently suffering from massive infection and infestation problems caused by a particularly insidious malware epidemic....
 
» Two Guides to Building a Cyber Security Business Case
Increase your Cyber Security line of defense is very essential networking solution....
 
» Lawmaker Calls for Action for North Korean Cyber Attacks
Obama advised to increase cyber attack defenses to protect from North Korea...
 
» TJX Hacker Gets Rich While His Coder Rots in Jail
TJX hacker mastermind Albert Gonzalez was the person who profited the most out of his illegal credit card theft cartel, which left his coder, Stephen Watt, broke and presently facing prison time....
 
» Clinton Email Caught by NSA Secret Database
According to a recent New York Times article, the personal correspondence of former American President Bill Clinton has been captured by an extensive database of intercepted domestic and foreign email...
 
» Defend Against SSL Tunnel Hacks with UTM Firewall
Recently, Firewall launched the UTM hardware: a device with the innovative feature of examining encrypted Internet traffic within the SSL tunnel....
 
» Chinese Firm Vehemently Denies Cyberspy Accusations
Huawei, a networking company based in China, denies accusations that it's conspiring with the Chinese government to run cyberspy operations within worldwide communication networks....
 
» How Exposed Are You To Identity Fraud?
Seeing that there a lot of people who are worried about identity theft, identity fraud, account rackets, phishing expeditions, Trojan swindling schemes, and many other related cyber scams, it's time t...
 
» Study Shows Employees Bypass Network Security
New research conducted by the Ponemon Institute reveals a severe lack of enforcement and awareness of security regulations within companies nowadays....
 
» VSE 8.7i Patch Failure Downplayed by McAfee
About a week ago, a McAfee service pack did more harm than good to several computer systems by making them outright unbootable once it's installed. The support forum of the company is now trying its b...
 
» Hacker Challenge Proves StrongWebmail Wrong
StrongWebmail has finally conceded that a group of non-criminal hackers has defeated its security system challenge and won a total of $10,000. ...
 
» Crypto Attack Finds Chinks in Algorithm's Armor
Cryptographers from Sydney, Australia have found a way to break the SHA-1 digital-signature algorithm....
 
» Breaking News: Twittering Could Get You Burglarized
An overenthusiastic Twitter user tweeted about going out of town, which may or may not have led to his residence getting burglarized....
 
» Apple IT Security in Dire Straits
A renowned security expert claims that Apple is currently struggling to sufficiently protect its customers from malware, phishing, and other hacker shenanigans....
 
» ISP Denies Passwords Cause of Disastrous Hack
A web host director adamantly maintains that the hack that wiped out data for more than 100,000 web pages was not caused by poor server configurations and password management. ...
 
» Latest DoS Attacks Endanger Mobile Data Networks
Last week, a senior telecoms security researcher cautioned that a new and evolved type of Denial of Service attack is currently threatening the safety of worldwide mobile data network security....
 
» Hacking Scam Yield Hacker $112,000 Total Earnings
A hacker from Hampton, New Hampshire was convicted of fraud charges for his scam to use trojans to empty the brokerage accounts on his targets' PCs....
 
» China Mandates PCs to have Web Filter
China is planning to expand its stiff web filter policy by requiring all personal computers sold to it to have software that blocks entry into certain web portals by July 1 of this year....
 
» The Safeness of Internet Voting
Last year, Arizona became one of the pioneers of using the Internet to accept and tally electoral votes online. However, it does beg the question of whether or not that's a good idea. ...
 
» Hackers Breach UK Communist Site
Long story short, the official webpage of the Communist Party of Britain has been breached by either Chinese or Russian hackers and infected with malware....
 
» Twitter's Trending Topics Exploited By Enterprising Hackers
Hackers are currently taking advantage of yet another popular Twitter trend and using it to spread malicious links and other forms of cyber attacks....
 
» Is the Nationwide Cyber Security Threat Overstated?
Is hacking really the newest terrorist threat to hit the United States, or is the government merely blowing the issue out of proportion in order to get their budgets approved and authority expanded?...
 
» Sears Settles in Regards to Spyware Charges
Sears, one of the biggest American retailers on the planet, has agreed to settle the lawsuit submitted by federal authorities claiming that the company slipped spyware from ComScore onto its customers...
 
» Homeland Security Advisory Council Has Hacker Member
Jeff Moss, the organizer and founder of the Defcon and Black Hat hacker and security conferences, was among the sixteen recruits that joined the Homeland Security Advisory Council on Friday....
 
» Mega Patch Gift from Microsoft Next Week
On Thursday, Microsoft announced that it will send over ten security patches, fixes, and updates to repair serious vulnerabilities found within Microsoft propriety software by next week's time....
 
» Halifax Scores Victory with PIN Security Case
The "phantom withdrawal" verdict favoring the UK retailing bank Halifax could possibly go straight to the court of appeals....
 
» Bing Gets an Extra Pornography Filter
Microsoft has included an additional pornography filter to its Bing search engine in order to block persistent pornographic content from slipping via the Smart Motion Previews service....
 
» Gamer Hacks Bank Balance of Spymaster Game
An irritating micro-blogging game has been hacked through a funding exploit that eventually led to a wealth redistribution spree of in-game cash....
 
» Online Safety Reassured with Harmful ISP Shutdown
The FTC (Federal Trade Commission) announced yesterday that it had Pricewert shutdown with the help of a San Jose district court. ...
 
» Air France Flight Domain Name Registration Controversy
As investigators continue to determine the reason behind Air France flight 447's untimely crash and disappearance, a lot of speculation has arisen from a domain name registered two years before the ca...
 
» Cyber Security Staff Appointed by DHS
Janet Napolitano, the U.S. Homeland Security Secretary, has appointed Philip Reitinger as the Director of the NCSC (National Cyber Security Center), supplanting predecessor Rod Beckstrom after he quit...
 
» Security for Internet's Root Zone Finally Implemented
On Wednesday, the U.S. government revealed plans to digitally sign the Internet's root zone by the end of 2009....
 
» Trojans Nestled into ATMs from Eastern Europe
Security specialists have uncovered a whole group of information-thieving trojans nestling themselves into ATMs across Eastern Europe for over a year and a half....
 
» Hackers Attack 40,000 Sites Overall
A piece of malicious code found in modified websites has so far been very successful in hacking over 40,000 websites globally. ...
 
» Feds Question Ex-Worker about Power Plant Breach
The Federal Bureau of Investigation (FBI) is investigating about a computer breach at a sizeable Texas power corporation that cost them over $26,000 worth of damages after the attack handicapped the f...
 
» Data Breach Lawsuit Aimed at Security Auditor
More than four years after the CardSystems Solutions Hack of 2004, the auditor of the company...
 
» Infestation of Security Bugs Invade British Websites
This week was filled with reports of high-status Internet bugs and glitches, with discoveries of pointless vulnerabilities on the sites of three British corporations....
 
» Microsoft Offers DirectX Hole Patch
Microsoft is now offering an easier way to create a workaround for the latest vulnerability in DirectX....
 
» MP's Facebook Has Been Hack Attacked
A member of the United Kingdom's parliament confirmed that his Facebook account was breached and hijacked by hackers....
 
» McAfee Report on SEO Exploit Released
Lately, scammers with great SEO (search engine optimization) talents are using search engines to make Internet surfers download malware. As such, McAfee has published a report to help users protect th...
 
» Obama Admits Government Unprepared For Cyber Terrori
Last Friday, President Obama addressed that the U.S. government was not as prepared as it should have been in responding to the recent bouts of cyber terrorism plaguing the country....
 
» Reaction to Obama's Cyber Security Speech Optimistic
President Obama's cyber security speech on Friday has left the cyber security industry abuzz about who the new "cyber czar" will be....
 
» Online Viral Outbreak Costs Google Ad Profits
A security researcher has warned that a virus-like web compromise has been making unsuspecting web surfers become part of a malicious botnet that forces Google search results to redirect to malware de...
 
» Best Video Twitter Worm Spreading Rapidly
Twitter users beware! Clicking on the link "http://juste.ru" found in a repeatedly spammed tweet will result in your account getting infected and compromised by a dreaded and widespread web worm....
 
» Nokia 1100 Can Be Used For Hacking Banks
According to a fraud investigation company, the urban legend about the Nokia 1100 mobile phone's capability to hack into bank transfers is very much true....
 
» Angry Hackers Attack Rootkit Web Pages
You won't like hackers when they're angry. This was what two well-known rootkit webmasters found out after they were DDoS attacked to nigh-oblivion by an irritated hacker faction....
 
» Teenage Hackers for Hire by the Pentagon
In what sounds like an ill-thought plot for a made-for-TV special in the Sci-Fi Channel, the military is currently looking for teenage tech geeks to help them with the cyberspace race....
 
» PC Super Plague Claimed 30,000 Victims
A dangerous system infection that attempts to install a Molotov cocktail of insidious malware into your PC has already plagued up to 30,000 websites maintained by government agencies, business, and ot...
 
» Obama Focused On Better Cyber Security Plan
Intelligence and military executives insist that something must be done about the state of cyber security in the U.S., so President Obama opted to create the cyber coordinator post....
 
» Keystroke Logging Technology Race Rages On
Despite the fact that hackers are continuously filling their arsenal with brand new toys and accessories, cyber security experts are determined to stay one step ahead by developing innovations of thei...
 
» Move Over, Conficker! Gumblar is Here!
Gumblar is staking its claim as the new most dangerous malware threat to hit the Internet while Conficker moves out of the public consciousness....
 
» Hackers Harboring Anti-American Sentiment Breach Mil
Investigators are currently subpoenaing records from Yahoo, Microsoft, and Google for an ongoing probe of an anti-U.S. hacker group's infiltration of military servers. ...
 
» China Insists to U.S. They Aren't Hackers
A celebrated Chinese Internet scientist asserted yesterday that there is no way that hackers from China or anywhere else can breach the firewalls of government or military networks to access classifie...
 
» How Secure Is Your Data While Traveling?
Wireless Internet connection is everywhere nowadays. However, travelers must be wary of hackers using Wi-Fi connections in order to extract your private, personal identification, business, and financi...
 
» Obama Set to Create Cyber Coordinator Position
President Obama braces himself in announcing the newly created post of "cyber coordinator"....
 
» Controversial Australian-Wide Firewall May Not be
On December 2008, hundreds of Australians rallied against their government's proposal to filter and monitor all Internet content in Australia. Because of that, the government is now saying that the co...
 
» Hazardous Microsoft DirectX Bug Presently Being Exploited
The dangerous DirectX vulnerability that Microsoft confirmed recently is now being exploited by hackers. ...
 
» Will Secunia's PSI Guarantee Secure Web Surfing?
Secunia's PSI (Personal Software Inspector) is a comprehensive application that not only inspects installed programs for online updates ...
 
» Romanian Immigrant Punished for Online Fraud
A Romanian immigrant that currently resides in Michigan was sentenced to eight years and six months for swindling 7,000 individuals via his phishing expeditions....
 
» Webcam Users Guide against Hackers
Because of many a user's persistent and erroneous beliefs about webcam hacking, this article has been written to clarify several issues about the oft-underestimated phenomenon....
 
» Symantec-Murdered Password Tool Resurrected
The seminal password tool named L0phtcrack returns long after Symantec halted further development of the application....
 
» Firefox Extensions that Protect You While Surfing
Because browsers have become the target of choice for many a cyber criminal, being secure while you surf has become increasingly important. On that note, security extensions from Firefox will do just ...
 
» Video of Hacker Terrorism: Hoax or Truth?
Is the Internet video of hackers playing Space Invaders with the lighting controls of a skyscraper an indication of a cyber terrorist apocalypse or just a simple web hoax? The answer will probably not...
 
» Man-in-the-Middle Attacks More Complicated Than Prev
An SSL expert warns that there's more to man-in-the-middle attacks than users think. To be more specific, browser problems and other factors are responsible in making this hacking method so effective ...
 
» E-mail Now Composed Of 90 Percent Spam
This isn't really news to many people, but official reports by Symantec now state what everybody else already knows: 90.4% of your email is composed of spam....
 
» Facebook User's Virus Lawsuit Has Been Dropped
On Tuesday, a Florida librarian and activist recently dropped his civil lawsuit against Facebook for failing to protect users against virus threats....
 
» Twitter API Serves As Web Worm Bait
A security researcher has cautioned that a Twitter API is currently being exploited by hackers to spread worms all over the social network....
 
» Infiltrated Flight Simulator Community Site Still Offline
Three weeks ago, a popular site that has served as a central hub for flight simulator fanatics for 13 years was suddenly and utterly annihilated by hackers. ...
 
» Offline Update 6.0: Update without the Internet!
With Offline Update 6.0, your fresh Windows and Linux installations can be updated without the need to head towards the Internet and risk hacks and worms in the middle of getting patches....
 
» Worldwide Cyber Security Measures Needed says ITU
In a conference in Geneva, the International Telecommunication Union (ITU) has proposed for the harmonization of worldwide cyber security legislation....
 
» The Most Harmful Facebook Spam Ever
Right this instant, hackers of pilfered Facebook accounts are spreading a harmful virus spam....
 
» Palin Hacker Claims Pilfered E-mails Public Record
The Sarah Palin hacking case took a strange turn when the defense made a surprise legal maneuver where they claimed that her stolen e-mails were public record....
 
» The Three Most Infamous Hackers
Here's a look back at the most infamous hackers the world has ever seen who have set the bar for future online outlaws....
 
» Reviewing 2008's Most Critical DNS Security Hole
Last year's demonstration of an MDS design flaw via the easy creation of fake CAs using a collection of Sony propriety game consoles served as an important event in the world of Information Technology...
 
» Is Cyber Warfare Becoming Real Warfare?
As we speak, the neutral zone between cyber attacks on communication networks and good old-fashioned war that's waged with swords, guns, and bombs is narrowing spectacularly....
 
» Bug for Cisco's TFTP Server Patched
A recently exposed vulnerability found in CiscoWorks TFTP Server permits hackers to gain unauthorized access to system files. As such, Cisco released a fix for this particular bug. ...
 
» U.S. Military Now Has Special Hack-by-Numbers Device
Gadgets that control cyber attacks are currently being tested and developed by the U.S. military and Internet security agencies in preparation for a virtual war....
 
» Mystery Virus Baffles U.S. Marshals and FBI
An unknown virus has supposedly interrupted the webmail services of the U.S. Federal Bureau of Investigation (FBI), and it may be the same virus that attacked the U.S. Marshal's computer systems....
 
» Clickjacking Design Flaw Possible Target of Hackers
A clickjacking prank exploiting a design flaw of the Internet leaves people afraid of the implications of this new vulnerability....
 
» Die Hard with a Vengeance: Conficker Lives On
Although media coverage of the Conficker superworm has ebbed in recent days, several variants of the malware are still infecting about 50,000 new machines every day....
 
» Adobe Releasing Security Upgrades Every Three Months
Adobe's Director of Product Security and Privacy recently wrote a blog post announcing Adobe's quarterly release of security upgrades that coincide with Microsoft's Patch Tuesday....
 
» Password Reminders Are Also Exploitable Security Holes
Password reminders are useful to people who tend to forget the password they used on a recently opened or long abandoned account. However, they also prove to be vulnerabilities that hackers can use to...
 
» Online Outlaws: Russia's Cyber Terrorists
Cyber terrorism and cyber crime has been on the rise worldwide as of late, and hackers from Russia have proven themselves to be among the most dangerous hackers out there....
 
» Microsoft's Tool for Secure Software Development Released
As part of the SDL (Security Development Lifecycle), Microsoft has created a tool that allows developers to incorporate the information stockpiled through SDL into their software development environme...
 
» Update on Unfixed Vulnerability of Mac
Here's an update concerning the six-month old vulnerability found on Apple's Mac platform....
 
» Cyber Security Groups Up Against Malware Menace
A trio of cyber security groups announced yesterday their plan to team up and fight against the growing threat of malware....
 
» University Server Breach not By IIS Vulnerability
Hackers have reportedly targeted Microsoft's Internet Information Services (IIS) web server, according to the administrators of Ball State University. However, the report turned out to be a false alar...
 
» Google Confesses Chrome Vulnerability during Hacker
Chrome may have won against other browsers in the Pwn2Own hacker contest, but Google still admits that its browser had the same vulnerability that all the other browsers had at the time of the event....
 
» NTPD Service Suffers From Buffer Overflow
The Network Time Protocol's open source implementation or NTPD is vulnerable to buffer overflows, which could allow attackers to remotely compromise or even crash a system....
 
» Microsoft Confirms Server Vulnerability Reports
Microsoft recently confirmed last week's reports of a vulnerability in the Internet Information Server (IIS)....
 
» Negligent Apple Ignores Critical Java Vulnerability
Even after Sun Microsystems warned about the Java virtual machine's vulnerability six months ago, the hole remains unpatched on Apple's Mac platform....
 
» MPAA Wages War against RealNetworks
RealNetworks may soon become the latest legal conquest of the Motion Picture Association of America (MPAA) and its unending quest to protect the entertainment industry's copyrights and intellectual pr...
 
» Facebook Becomes More Open with OpenID Support
Working in tandem with OpenID, Facebook now supports the OpenID login standard....
 
» Dell Believes Windows 7 Too Expensive
A Dell representative states that Windows 7's current price could prove to be the barrier that keeps it from being adopted by users despite the fact that every other aspect of the operating system is ...
 
» Controversial ContactPoint Goes Live Amidst Security Fears
The United Kingdom's government has announced their campaign to launch a controversial child protection database amidst worries of it not being secure enough against potential data leakage....
 
» The BillMyParents Service Does Just That
The BillMyParents payment system will allow children to spend their parent's money online provided that the parents agree to buy them what they want....
 
» Canonical's Ubuntu Enters New Frontier
Canonical has recently started beta-testing Ubuntu One, a file-synchronization service, for its Ubuntu Linux desktop operating system. ...
 
» Wolfram Alpha Debuts with Glitches and Jeers
This Friday, the new Wolfram Alpha search engine's official unveiling was marred by terrible weather conditions on the site of their supposed launch and numerous networking glitches....
 
» Mozilla's Post-Tab Era Cometh best Firefox Browser
Even as Internet Explorer belatedly adopts the tab-based services of their browser competitor, Firefox, yet another technological shift may leave Microsoft in the dust once more....
 
» Open Database Alliance to Keep MySQL Alive
Michael Widenius is currently supporting MySQL by forming the Open Database Alliance (ODA), a consortium that should help keep MySQL at the cutting-edge of open source database development....
 
» IE's JavaScript Focus May Be Its Undoing
Microsoft's concentration on improving how Internet Explorer (IE) handles certain features of JavaScript may have caused it to be left behind by its web browser competitors in the dust....
 
» The Graphics Memory Industry Now Has Micron
Micron has recently entered into the DRAM chips market after landing third in worldwide sales of Dynamic Random Access Memory (DRAM)....
 
» Craiglist's Erotic Services Section Gets the Boot
Craiglist has finally surrendered to the demands and requests of police officers from all over the country, resolving to shut down its "erotic services" ads. ...
 
» Has Google's Top-Secret Cash-Making Machine Been Exp
Hitwise has uncovered that Google's paid ad clicks has taken a massive drop during the past month. Could it be that Google's clandestine money-making scheme has been exposed as ineffective? ...
 
» Gmail Feature Encourages Users to Switch
Gmail now has a feature that helps migrate contacts and email from other email providers, which includes AOL, Hotmail, Yahoo, and a few other services. ...
 
» New Visa card technology helps prevent fraud!
Visa introduces new technology to help prevent credit card fraud....
 
» Are Wireless Networks in Finance Districts Insecure?
Air Tight Network's study shows that wireless networks in finance districts are relatively insecure....
 
» D-Link Improves Routers Captcha style
D-Link improves routers and fights malware by using Captcha code....
 
» The Importance of First-Party Video Games
First-party video games in the vein of Nintendo's Super Mario Brothers and Sega's Sonic the Hedgehog are very important in the continued evolution of video gaming....
 
» Doro PhoneEasy 338gsm Goes Back to Basics
Doro, a Swedish company that released its first line of easy-to-use mobile phones two years ago, caters to a very specific and sometimes neglected target market. ...
 
» What is the Point of Microsoft Research?
Microsoft Research's byline of helping develop new innovations to give corporations a competitive edge through fundamental research doesn't necessarily apply to the software giant....
 
» E-commerce Lacks Consumer Trust
Marketers using the Internet to sell their goods find it difficult to earn consumer trust because of the ongoing threats of spyware, spam, phishing, and identity theft....
 
» Bickering and Internet Drama Ensues Within Firefox
Last week, alarms were raised in the Firefox community after the developers of two popular Firefox extensions started duking it out over a disagreement that's been brewing underground for a long time....
 
» Shorter Meetings Software Patented IBM Brainchild
IBM has filed a patent for an application that intends to address the "arbitrary hour-based scheduling paradigm", which should hopefully lead to employers having "shorter meetings" in the future....
 
» WSJ Insists on Micro-Payments Model
According to a report in the Financial Times, the Wall Street Journal has begun plans to charge non-subscribers micro-payments for access to individual articles online. ...
 
» Sun Shareholder Lawsuits Undermine Oracle Takeover
Sun shareholders are filing three class action lawsuits against software giant Oracle in an effort to stop the $7.4 billion acquisition deal....
 
» GPS Ruling Shakes Up Privacy Activists
An appeals court in Wisconsin has just approved local authorities to use GPS tracking devices on anyone they deem fit without the need for a search warrant....
 
» Google Plans to Start Twittering At Last
Is Google a little slow on the technological uptake or is it now hitching the Twitter bandwagon? ...
 
» Ofcom Discovers Reason of UK Wi-Fi Failure
Ofcom has commissioned a report investigating Wi-Fi performance in the United Kingdom. It concludes that TV senders, baby listeners, and the "Free Public Wi-Fi" virus are the ones interfering with the...
 
» iPhone Inside: Specs and Silicon Secrets
Apple considers the iPhone's inner workings a trade secret that users don't need to know, but should it be kept a secret?...
 
» Microsoft Ad Targets Apple's Artist Audience
Does Microsoft even know how to appeal to a demographic normally associated with Apple? ...
 
» Facebook Adds Refresh Alerts to Homepage Stream
Facebook adds a helpful new refresh alert feature in their equally new, stream-focused homepage to better acclimate its users to its recent changes....
 
» Happy Birthday, Planar Integrated Circuit!
On Friday, May 8, the Computer History Museum celebrated the creation of the integrated circuit, one of the most important inventions of the modern era. ...
 
» Sun May Have Broken Some Bribery Laws
Sun discloses that they may have committed some mistakes and violations concerning U.S. laws designed to prevent bribery in foreign countries....
 
» U.S. Air Traffic Control Systems Breached
According to a recent government report, hackers were able to penetrate and partially shutdown an air-traffic data system in Alaska partly because of the modernization efforts of the FAA....
 
» Google Chrome Launches Own TV Ads
The Google Chrome TV ads will soon be shown across conventional American TV after their initial success with the Japanese market and the Internet. ...
 
» Multinational Companies Whine about Project Canvas
Consumer electronics corporations are complaining over the alleged negative impact Project Canvas will bring about to the United Kingdom once it is finally implemented. ...
 
» Vulnerabilities in Gmail Mail System Gfails Again
Access to Gmail has been denied to many users of the ever-popular electronic mailing service this Friday, which is reminiscent of a similar outage just a few months ago. ...
 
» Worm for Mac is a funny, little joke
A worm for Mac made in Tunisia is more successful in making us laugh than panic....
 
» European Union Parliament supports Internet freedom
The EP has voted in favor of Internet freedom, but the Council remains opposed to the idea....
 
» North Korea strengthening its online warfare?
North Korea is reported to have ordered 100 hackers for its global, online, offensive mission....
 
» Data centre of IBM Warwick fails
Data centre of IBM Warwick failed due to a power outage last Thursday....
 
» Windows 7 still cannot handle popular hack
How do Windows 7 retains Windows NT and others' vulnerability....
 
» US National Security Agency wants a consolidated
The US National Security Agency is preparing for a unified cyber command center....
 
» New US P2P bill aimed at limiting file sharing
The new bill, "The Informed P2P User Act", aims to limit file sharing over P2P networks....
 
» $10 million in exchange for stolen medical records in Virginia
Hackers demand $10 million in exchange for stolen medical records of nearly 8.3 million Virginia patients....
 
» McAfee not so free from security bugs
Even big-time antivirus software and Internet security provider McAfee was not spared by bugs....
 
» Silent updates improve security, based on study
Automatic browser updates better than manual ones, based on Google and ETH study...
 
» LexisNexis belatedly warns 32,000 users of credit card fraud
Over 32,000 customers of LexisNexis at risk for credit card fraud....
 
» Permabit's new product will take care of your bulk data
If storing your bulk data is a dilemma, have a look at Permabit's release, the 4010....
 
» Panic over Conficker gives room for botnet
With more people looking at Conficker, cybervillains spread botnets with ease....
 
» Security Update will solve Adobe Flash Media Server's
Adobe discovered a vulnerability in its Flash Media Server, but all it takes is a Security Update to fix this....
 
» Botnet stole 70GB worth of data in 10 days
Researchers managed to hijack a botnet and found out it stole 70GB worth of data in just 10 days....
 
» WordPress vulnerable to security attacks
WordPress vulnerability discovered; users advised to upgrade at once....
 
» Sensitive information on British health patients stolen
Trusts of the UK's National Health Service (NHS) were reminded of patient privacy due to four recent breaches....
 
» Lenovo releases secure AES-encrypted USB
Lenovo releases its latest USB that is encrypted using the AES-algorithm, which has survived all cryptological attacks to date....
 
» Twitter hacker viewed celebrities personal info
French hacks Twitter; celebrities' personal info, among others, jeopardized...
 
» Security software should learn from Conficker, experts say
With the Conficker bug exhibit very sophisticated behavior and dodging efforts to fight it, experts believe security software manufacturers should learn from Conficker to stop further cases of massive...
 
» 16-year-old Swede hacked Cisco, NASA, and others
Encroachment of NASA and Cisco, among others, traced to a 16-year-old Swede....
 
» Electronic voting machines not immune to tampering
Electronic voting systems may still be vulnerable to vote fixing and tampering, a study done by the CIA shows regarding electronic voting in many foreign nations....
 
» Electronic health records not hack proof
The recent shift to electronic health records from the old filing system may not be as safe as they are supposed to be, but companies are taking advantage of this to offer companion services to enhanc...
 
» Experts hijack Torpig botnet to learn more about its extent
For ten days, security researchers were able to gain control to the Torpig botnet, and glimpse the extent of the damage it has done as well as the motives and direction the botnet is going....
 
» Businesses in Asia Pacific vulnerable to information
Symantec showed in its report that businesses in the Asia Pacific and Japan are quite vulnerable to increased information attacks, with Hong Kong a standout among them with a casual attitude toward se...
 
» EU cyber security superbody proposed
Despite an information exchange body already set up, the head of EU's information and media wants to create a position in the EU to adequately deal with the information network security of the contine...
 
» Chrome, Firefox users most up to date, says study
A study by Google shows Firefox and Chrome users are ahead when it comes to securing their browsers by using the latest version, a result the study believes to be largely due to the effectiveness of a...
 
» Conficker bug found in medical devices
Apparently not only contained in normal PCs, the Conficker worm has recently been spotted in medical devices running an unpatched operating system. Experts worry this may yet cause damage and trouble ...
 
» Games pose privacy and security threat
Security experts discussed how online gaming worlds can provide scammers and other individuals avenues to exploit security lapses and profit from the ever-expanding user base....
 
» EV SSL not immune to hacking, phishing attacks
Vendors of the more expensive EV SSL certificates claim they can thwart any attempt hackers make to hijack user-initiated sessions, but two researchers show how their assumption may be wrong....
 
» Scammers play on fears to get information, money
In an ever fearful atmosphere caused by real threats of malware attack, scammers are playing on these fears to trick users into paying them for fraudulent software, Microsoft reports....
 
» Faulty HTTPS implementations risks users
While users have grown accustomed to HTTPS as a secure protocol, improper implementation of HTTPS may compromise users and nullify any potential protection - a fact that hackers may have been exploiti...
 
» New bill set to replace unpopular US cyber security act
With FISMA's unpopularity and perceived lack of actual security improvements implementation a new set of guidelines and governing rules is being propose to replace this older act....
 
» Firewalls need to adapt roles from barrier to gatekeeper
With the increasing number of mobile devices connecting to online systems and networks, firewalls need to do more than prevent unwarranted external access but also provide security for mobile access....
 
» Russian ex-employee faces deportation for extorion
A Russian immigrant fired from a US investment firm may find his immigration status in jeopardy as he is charged with blackmaliling his former with threats of enlisting hackers to compromise their sys...
 
» Swine flu a good time for scammers
With the swine flu spreading in different parts of the world, malicious scammers play on fears to trick more people into downloading malware. Meanwhile, other Internet companies have set up efforts to...
 
» Security group addresses cloud computing risks
A new security group focusing on cloud security was formed to address the growing issues regarding securing the ever increasingly popular cloud computing service....
 
» Federal agencies complying to ever stricter standard
A government-wide report on compliance to federal standards for IT security have shown that government agencies have complied as a whole; this is despite some sentiments that the security measures and...
 
» Adobe finds yet another critical security hole
Another security vulnerability was reported by Adobe in their Adobe Reader program which may be exploited by hackers looking to execute malicious code on machines....
 
» Hackers outsourcing captcha-bypassing activities
With captcha technology being more and more successful in repelling automated bot attacks, hacker groups turn to captcha -breaking groups and take advantage of cheap labor to break into social network...
 
» Theft of government laptop sends residents into panic
More than a million residents of Oklahoma had their Social Security numbers compromised when a laptop containing sensitive information was stolen from a government employee....
 
» Paradigm shift necessary to adapt to changing securi
The president of Symantec suggest that instead of trying to patch individual holes in a system's security, organization should look to automize and integrate solutions to better protect their assets....
 
» Top botnets easily spams 25,000 messages an hour
Two botnets are among the most prolific spammers online, a study shows when researchers infect machines on purpose and observe their behavior....
 
» UK man's money disappears from account, doubts placed
When money disappears from a UK man's account, he claims that someone else took it without using his card. ...
 
» Obama's helicopter details leaked via P2P
P2P clients may have unwittingly compromised security plans of President Obama's helicopter and may have possibly leaked it to Iran, a report shows by an online security group....
 
» Obsolete phone fetching staggering prices due Crimin
While the phone may seem outdated for today, criminal groups are paying good money to obtain certain handsets for use in committing high-tech online bank heists. ...
 
» NSA wants to work together to keep US systems secure
Relaxing concerns over NSA's role in United States cyber security, NSA chief Lt. Gen. Keith Alexander spoke at the RSA Conference 2009 that the NSA was not only willing to help in the effort but also ...
 
» Experts debate balancing security and privacy
As experts convene in the RSA Conference to discuss managing the tension existing between upholding public security, different issues are tackled on how to promote both aspects without sacrificing one...
 
» Businesses, credit card industry struggle hackers
The rapidly developing hacking community has but credit card companies and businesses at odds - debating whether the current credit card industry information security standards are up to the task of e...
 
» Security experts ponder on the future of cloud Compu
While cloud computing is the latest buzzword to circulate around the Internet, experts view this new paradigm with varying degrees of anticipation. But all agree on the new security challenges this sy...
 
» Pentagon creating cyber security superbody
The Pentagon is forming an umbrella security group to handle cyber security for the different branches of the military and the Department of Defense, in light of recent reports of hackers stealing awa...
 
» Conficker botnet smaller than worst fear
Experts show that rather than the millions of infected machines expected from the recent updating of the Conficker worm, the figures show a significantly smaller network of infected computers communic...
 
» Dirty devices invading US market
Industry experts are asking whether the recent influx of infected computers and devices are a product of deliberate espionage or merely substandard industry practices abroad?...
 
» FBI engages in own phishing and hacking
With the release of documents pertaining to FBI's cyber security activities, concerns rise whether the FBI may be abusing their powerful and effective surveilance software by using them too often in c...
 
» Macs not safe from malware anymore
While Mac users were once confident in the security of OS X, the recent discovery of the world's first known MAC OS X have shown that the increasing number of Mac users have not escaped the eye of mal...
 
» Twitter hacker gets job for his efforts awarded
As his high profile hacking of Twitter continue to attract a lot of attention, 17 year-old Michael Mooney has received offers to do security analysis from certain companies. This is amid growing conce...
 
» P2P snooping may leave users guilty by association
P2P users used to feel safe within the crowd of millions of other users downloading content, but new research shows certain patterns in networking which maybe exploited by corporations looking to clam...
 
» SonicWall server glitch leaves networks unprotected
An outage at SonicWall's licensing server disabled subscription-based security services for customers for at least several hours on Tuesday, according to the company and an angry customer....
 
» Worm uses familiar brands to lure people
On Tuesday security vendor WebSense issued an alert warning that holiday coupon e-mails from familiar companies may be malicious code in disguise, in this case a mass-mailing e-mail worm....
 
» Whither Cisco MARS? IT Security Monitoring? Security
Cisco System's Security Monitoring for Threat Identification, Mitigation, and Compliance (aka MARS) product is the company's offering for security and compliance ...
 
» Microsoft learns of successful RPC worm infections
It's been more than a month since Microsoft issued an emergency out-of-band patch to fix a remote call procedure (RPC) flaw, but the software maker says some companies are learning the hard way by fai...
 
» Skype Scrambles After Breach And Censorship Info
American companies operating in China have what might be considered a tradition of getting in trouble over privacy and censorship...
 
» Apple iPhone 2.2 update includes critical security
Apple issued version 2.2 of its iPhone firmware, repairing at least a dozen security issues, including dangerous flaws in its Safari browser that attackers can exploit to steal passwords, account info...
 
» Defense Companies Hit By Malicious Code
This one definitely goes well beyond "whoops? while a few security stories relate to fairly harmless issues. ...
 
» Microsoft himss increases health user group to EMEA
Microsoft Corporation and the Healthcare Information and Management Systems Society (HIMSS) have recently announced the availability of the Microsoft Health user group (Microsoft HUG) all over Europe,...
 
» Cyber criminals take advantage of Obama
After Barack Obama's historic win in the US presidential elections has created a sensation all around the world, the cyber criminals got a great chance to spread malware in the form of his campaigning...
 
» Adobe Reader is unprotected Vulnerable to hacks
Core security Technologies advised millions of individuals and business firms around the world who use Adobe Reader PDF file viewing software, which is unprotected and open to attack. ...
 
» Americans are alert about cyber crimes security conc
According to a recent survey conducted by the National Cyber security Alliance (NCSA) reveal that more and more ...
 
» Scan On For the List of Malicious Malware Programs
* Tixcet.A: masked as a Microsoft Word file, this worm will try to turn Halloween into a nightmare by deleting files with specific extensions (.DOC, .MP3, .MOV, .ZIP, .JPG, etc.). ...
 
» Google alters JotSpot privacy settings after complaint report
Google said Friday that it was altering the privacy settings on its JotSpot online collaboration service afterwards a researcher came across that user e-mail addresses and names were being exhibited t...
 
» Master Piece of Crimeware Ever Created
The Sinowal trojan has stolen 500,000 online bank accounts and credit and debit cards. RSA stated the trojan virus has infected computers all over the world. "The effect has been rattling worldw...
 
» Data Security Breach over Top Most MNC
Scarcely a day passes away without additional security breach casting at peril the personal details of the UK public. ...
 
» Bakasoftware Russian Scareware Named and Shamed
A Russian software company has goldbricked millions of revenue out of foreigners by involving into a web security scam. ...
 
» Web Security Firm Warns to be Vigilant Of Obfuscated
A Modern compromise at a corporation directed to a noteworthy amount of data being stolen, ...
 
» Lab Screens Evidence That Personal Records Are Leaking
Bank account numbers, health records, social security numbers and internal auditing operations are examples of the kinds of information that is unknowingly "leaking" out from data centers. This agitat...
 
» Fraudsters Get Into the Cloud Cyber Scams Beware
Cyber-terrorists are employing the ideas of cloud computing to internet fraud in a move that means even technically illiterate criminals can move into cybercrime. ...
 
» Malicious programs a problem for New York Internet
Just about a quarter of New York State Internet users happened to find a badware infection on their computer ...
 
» United States Senate candidate has email hacked
SARASOTA - As campaigns get into the final week, a Suncoast candidate opposes when she finds herself vulnerable by an internet hacker. ...
 
» Security Blue Print Has Levied A Path in Building C
IT professionals, while aligning IT operations with the organization?s broader strategic goals, they must also maintain and establish a definite security strength which ensures compliance with listing...
 

UTM Firewall - Vulnerability Scanner Free Security Resources
Free Vulnerability Scan

Free Security Webinar

IT Security Compliance with
hipaa compliance, cve compliance
WiFi Password Finder Awards & Reviews
Best IT Security Company
Best IT Security Products


Encyclopedia | Link Policy | Privacy Statement | Resources | Sitemap | User Policy

SecPoint® © Copyright 1999-2015
US Toll Free: +1-855-489-3724 - EU Toll Free: +44-808-101-2272