UTM VPN Firewall - Vulnerability Scanner - Wifi Password Pen Test
SHOP
CLOUD
VIP LOUNGE

You are here: Home > SecPoint Blog

SecPoint Blog - Follow the latest IT Security News TV Show and news here

IT Security News RSS Feed
» IT SECURITY NEWS
 
» Is your router Vulnerable to the NetUSB or Backdoor
Is your router one of the many millions that are wide open to attack? Scan your site for free and find out....
 
» How to NUKE DoS your Wifi Access Point eaisly
How can you find out if your wifi access point is being attacked by remote hackers and taken down?...
 
» Find out if you are vulnerable to Poodle Heartbleed
Free Scan to find out if you are vulnerable to Poodle, Heartbleed vulnerabilities...
 
» Are you vulnerable to the new Shell Shock Shell bug
New High risk vulnerability hits Linux, Mac OS X and embedded devices...
 
» Run 3 antivirus scanning engines at the same time
No one single Anti Virus will find all virus possible. So the cure is to run up to 3 at the same time...
 
» 10 tips for using web vulnerability scanner
Vulnerability Scanning 10 tips...
 
» 10 tips to a secure network Click to find out more
Secure your network before it is too late 10 simple tips...
 
» 10 tips to a secure Wi-Fi Close vulnerabilities clic
Wifi security Tips...
 
» Top 10 tips for using a firewall
How to use a firewall securely...
 
» 10 tips for using vulnerability scanning
Tips for Vulnerability Assessment and Vulnerability Scanning...
 
» How to Perform a Hipaa Vulnerability Scan
Hipaa vulnerability scan made easy...
 
» Major Cyber Attacks in 2014 hacking on the rise
Discover more about major Security Attacks in 2014...
 
» Hidden trick how to Super Boost Virtualization Speed
Increase easily 30-40% the speed of your Virtual machine such as Portable Penetrator with Hidden trick...
 
» How to choose Vulnerability Scanning Profiles
Find out how to easily choose between 9 profiles when performing a vulnerability scan...
 
» How to submit a security vulnerability to the database
Easily submit a security vulnerability in to the database...
 
» Hyper-V Vulnerability Scanning Virtual Software Image
Microsoft Hyper-V Vulnerability Scanner Software Virtual Image...
 
» What are the weaknesses of vulnerability scanning?
Discover more about What are the weaknesses of vulnerability scanning?...
 
» Penetrator Vulnerability Scanner Helpdesk
Vulnerability Scanning Management Ticket System...
 
» Weaknesses of penetration testing
Learn more about Weaknesses of penetration testing...
 
» What are the weaknesses of UTM?
Are there any limits of a UTM Firewall Appliance...
 
» What are the weaknesses of website security?
Website Security Strength and Weaknesses...
 
» Difference between firewall and a UTM appliance
Do you need a Firewall or a UTM?...
 
» Differences between vulnerability assessment and vuln
Find out what the difference is on vulnerability scanning and vulnerability assessment...
 
» Difference between WPS and WPA cracking
Learn how attackers compromise WPA and WPS...
 
» Top 10 UTM Firewall functionality
Ultimate Top 10 UTM Firewall Functionality revealed...
 
» Vodafone Users details hacked by Turkish hackers
According to various sources, Vodafone Iceland has been hacked, and it has left 77,000 records of various users at risk. ...
 
» Messages can crack Googles Nexus 4 and Nexus 5
A class 0 SMS can now crash a remote Google nexus phone, which has recently been published by a Dutch security expert...
 
» Is your new LG TV really the spy next door?
LG recently admitted that some of its latest televisions sets have been found to log the viewing habits of its viewers, and that too without their permission...
 
» Experts Warn the Hacking of Obamacare website
Many Hackers have already tried to attack and hack the website from Obama which is on medical insurance...
 
» Switched Off or Powered Off Handsets Now Traceable
The first hand news that we all receive in the morning papers on November 13th 2013 is National Security Agency’s poised to locate the cell phones of any person for the last one thousand locations...
 
» Offline Malware Stuxnet Hit Iranian and Russian Power
The situation if present within the systems and the situations where the malware spread is through Internet Operating Systems and servers, things look under control. ...
 
» Threat Track Security vs. Cyber Espionage! Huge Reveal
According to the recent studies from the “Threat Track (TTS) Security”, approximately six out of 10 malware system analysis at the United States the enterprises have actually investigated or have addr...
 
» Apple Discloses Privacy report details
As per Apple, the maximum number of requests received is for information from law implementation departments regarding stolen or lost apple units....
 
» IT Security Threat by Anonymous in Singapore!
SINGAPORE - Activist group though Anonymous have hacked the website of a newspaper “Friday” about Internet freedom in Singapore city....
 
» IT Security and its Optimization
Drawing to our global as well as uncompromised and independent perspectives, the dedicated teams of IT experts...
 
» Top Five IT Security Threats See if you are vulnerab
Our electronic and safety devices have formed a big space in our lives in today’s world...
 
» Non-Hacker convicted of Hacking
David Nosal after a short two week trial was convicted by a law designed to prosecute hackers even though his crimes could not be considered as how traditional hacking is defined....
 
» Routers Requiring Attention Security Holes
A majority of popular router models are vulnerable to exploits and are quick to spot by hackers within a network. A security firm went out to verify and test just how vulnerable some models of routers...
 
» Pirate Bay Cofounder Indicted for Hacking Plot
Gottfrid Svartholm, Pirate Bay's cofounder, has been indicted with charges of hacking that's separate from his one-year prison sentence for founding the illegal file-sharing site....
 
» Ex-Military Hacker Hired by Google
The US Department of Defense's clandestine military research bureau had an ex-hacker who has retired after three years of service. He has recently been hired by Google....
 
» Exposing the PayPal Bug That Exposed Privacy of Users
Security experts have released a more comprehensive report regarding the recently fixed SQL injection security hole that plagued the PayPal website a few weeks back....
 
» Court Fight Exposes FBI Smartphone Surveillance Tool
Thanks to a court battle, the secrets to a smartphone surveillance instrument used by the Federal Bureau of Investigation (FBI) of the United States of America has been exposed and documented. The leg...
 
» True Email Privacy Might Now Be Achievable Thanks to
Encryption was not free about 22 years ago until the team of Jon Callas, Phil Zimmerman, and the PGP group made it available for mass consumption without the exorbitant price. 22 years later, and the ...
 
» Apple Home Ground Invaded by Microsoft Developer
From June 26 to 28, 2013, San Francisco's Moscone Center will accept Microsoft to host the upcoming BUILD Developer Conference, but two weeks prior, Apple will be hosting its own WWDC. Who among the t...
 
» The Seoul Saga Malware Wipe Caused by Patching
The data wipe that happened last week in South Korea has devastated the nation. What's more, it was apparently caused by its existing network patching system; that's the reason why the malware was abl...
 
» Don't Download Pirated Android Mobile Apps Because
It's a bad idea to pirate the Android keyboard because it could be used by hackers to login into your different important accounts, like your email or your online banking systems....
 
» SCADA Systems and Their Vulnerabilities in Finland
Finnish security researchers have discovered that Finland could be facing a possible swarm of Internet hackers and crackers thanks to the fact that its Internet-facing SCADA (Supervisory Control and D...
 
» Honeypot from SCADA Attracts International Online
Honeypot industrial systems for controlling important equipment in the energy grid, factories, and airports... that is, any critical system... suffered sustained attacks within hours by worldwide cybe...
 
» 420,000 Node Botnet Came to Existence via Researcher
Researcher faces thousands of years in jail for good cause because the means does not justify the ends, and mapping out IPv4 Internet does not justify the questionable act of creating a 420,000 node b...
 
» Kali Linux is Released Pentesting Distribution
Finally the 6th edition of Backtrack Linux is here. This time released under the name of ‘Kali Linux’. ...
 
» Pwn2Own All browsers except Safari compromised
All browsers except Safari compromised...
 
» Security Shop Breach Exposes PayPal Payments, Avast
The Avast security firm pulls a Pontius Pilate, washing their hands of responsibility over the breach on a German reseller website that leaked PayPal payment details from thousands of clients. ...
 
» Indian Godzilla Wreaks Havoc in the Worldwide Web
Indian "Godzilla" hacker takes down 15 Pakistani government sites as revenge and protest for suspected terrorist activity by the nation's administration....
 
» Security Holes Allow Cracker Pwn2Own Entrants 500K
Better luck next time for Oracle, Mozilla, Google, and Microsoft coders, because the annual Pwn2Own Contest had them "owned" by entrants who won $500,000 by easily cracking through their popular softw...
 
» China versus Japan! Jinan Cyber War Ongoing
Malware that's believed to be created by the Chinese has been deployed against the Japanese. Is the ancient tension between China and Japan resurfacing in an online battlefield?...
 
» Mediator Anonymous Convenes Against Malaysian
In an unusual turn of events, pseudo-anarchist and hacktivist 4chan group Anonymous has served as a mediator between angry hackers from the Philippines and Malaysia (which is ironic, considering the a...
 
» DDoS Attacks in 2013 Distributed Denial of Service
Have you ever experienced not being able to access an application from your computer? In situations like this, people would often feel helpless and confused, ...
 
» The Latest Hacking Attack of Anonymous Hackers Israe
In the past, Israel has been bombarded by cyber attacks coming from Anonymous Hackers. To those who just heard this term for the first time, ...
 
» Survey Reflected the Opinion of the People Cyber War
Humanity has experienced many kinds of war. Some were brought about by the desire to extend one’s territory like the Persian War, World War I, World War II, the Vietnam War, and the Gulf War. ...
 
» Hackers Take Advantage of Online Dating Sites
Right now, there are a lot of online dating sites that single people can visit in order to find their special someone. ...
 
» Children Hackers Exist New Warfare Army Security
Hacking has always been one of the major issues these days. Everybody knows that it’s a crime and that it is punishable by law. However, even the law and the idea of punishment do not seem to deter so...
 
» Secrets of the Bushes Revealed by Guccifer
Do you remember US President Bush? Which between the two – Former president George Herbert W. Bush...
 
» Fitrianta Got Eight Years ffor hacking invalid click
The judges of West Jakarta District Court (last February 5, 2013) rendered their verdict to 'Cahya Fitrianta' who was charged of many crimes which included violating the provisions of the Law of Infor...
 
» Trojans Most Common Malware Infection Are you hit?
Trojans popular for hacking attacks and cyber wars...
 
» Schrooten Got 12 Year Jail Time
Last February 1, a Dutch citizen was sentenced to prison for 12 years by US District Judge Ricardo S . Martinez. Unlike any other criminals , David Benjamin Schrooten is a modern day felon. ...
 
» Laptop docking stations may not be as safe as you imagined
Due to success and going bust. That is why corporations invest a lot of money in ensuring their information stays available only for those who are authorized to see it. ...
 
» French Euromillions Website Hacked by Religious Type
Around October 27 to 28, the "Moroccanghosts" hacking crew decried the French lottery website Euromillions as a den of sin and depravity that does the work of the devil....
 
» DVD Cracking and Console Modding Legalization Denied
Copyright holders have denied proposals last week in regards to making DVD cracking and jailbreaking video game consoles legal....
 
» Government URL Shortener Service Abused by Spammers
Work-at-home scam spammers are using and abusing a URL shortener in order to go about their questionable business....
 
» Anonymous Affiliate Takes Down HSBC Websites
Around Thursday night yesterday, Fawkes Security... a group linked with the infamous hacktivists known as Anonymous... hacked and hijacked HSBC websites using a packet flood DDoS....
 
» $400,000 Bank of America Heist Done by Online Outlaws
A now-frozen account used to pay the wages of Washington government workers had nearly half a million dollars stolen from it thanks to cyber criminals....
 
» US Defense Secretary Warns Future Cyber Attacks 911
The US Secretary of Defense alleges that future cyber attacks on American soil could rival the 9-11 terrorist bombings of the World Trade Center back in 2001. ...
 
» Displaced Vendors in Cloud-Computing-Dominated IT
Vendors are currently feeling out of place in the Information Technology field thanks to cloud computing....
 
» Telemarketer Computer Scammers Caught Red-Handed
The Federal Trade Commission or FTC is currently targeting scammers that use scare tactics to cheat consumers of thousands of dollars by pretending to fix their computers. ...
 
» IBM corrects security report after criticism from Google
After revisiting their statistics, it turns out Google has no more critical security issues. ...
 
» Criminals continue DLL hijacking as developers Striv
Developers slowly addressing DLL hijacking vulnerability as Microsoft shares SDL knowledge and its DLL administrative tool....
 
» Pushdo botnet Power diminishes to almost nothing
Pushdo spam slowly disappearing from e-mail boxes....
 
» Microsoft specialists refute Apple's privacy policy
The privacy of end-users will be indirectly exposed. ...
 
» Microsoft admits existence of application code-execution bug
Microsoft admits IT Security Vulnerability...
 
» Speedport router WPA key a disappointment
Speedport W700V routers default security easily compromised...
 
» Halo: Reached earlier than expected
Leaked right under the nose of the Xbox Market...
 
» New tricks malware use to catch you off-guard
A new program that get you to uninstall your antivirus software for them to do their dirty work....
 
» Code-execution bug terrorizes Windows
Code-execution bug reaps terror on Windows applications....
 
» More secure VLC Media Player 1.1.3 released
New VLC Player with increased security protection...
 
» Studies show that Security Suites are getting left behind
Do antivirus companies really protect your computer? Find out how well they performed during testing....
 
» Rivalry in the Warez Market Illegal Software Downloa
Hackers fight over warez forums. Sensitive data used as ammunition...
 
» Cybercriminals get hacked Even Hackers hacked
What goes around comes around, it seems. Criminals included....
 
» Gift-card cloner on probation easily duplicate cards
Retailer stores, be extra wary!...
 
» New wheels reveal vehicles location
Tire pressure sensors in vehicles don't use encryption which makes it open for attack...
 
» NoScript misunderstood while XSS dominates websites
Most users are trading security over convenience when accessing the internet....
 
» VxWork module creates security hole in networks
Operating system two modules causes Security risk to networks....
 
» Thunderbird roasting in its own juices
Developers need to step up their game to get more competitive with other e-mail clients ...
 
» Fake Facebook virus more troublesome than real one
Fake Facebook virus messages spamming Facebook users. Stop spreading this to your friends....
 
» Company payroll not immune to hackers
A pharmaceutical company that uses a third party payroll system was hacked, placing the payroll of employees at risk....
 
» Adobe Reader still plagued with security flaws
Even the iPhone is not safe with this PDF Reader. Adobe needs to roll out more security fixes....
 
» Fool-proof cryptography coming soon!
Securely send encrypted messages only to a specific place!...
 
» Promised critical Microsoft patch rolled out
Microsoft Security Patch was deployed as promised....
 
» Virtual security progresses in the market
Virtual security takes it lead and will flourish in the year 2014....
 
» Apple improves the security of its popular products
Security of the Apple products are to be upgraded with the recently-released patches....
 
» Testing rules improved by the anti-malware officials
The anti-malware governing body deided to improve the testing principles so as to have advanced security testers....
 
» Amplify call center payment security, says Veritape
Security in the call centers of UK can now be tightened up with the vendor's newest product....
 
» Web giant appears with a come back
The agency requests for an explanation and the giant returns with a detailed reply....
 
» Humyo now owned by Trend Micro Anti Virus Click Info
Cloud technology is now a big hit....
 
» Ubuntu versus Windows and the former wins
Ubuntu is now the leading product based on consumers' opinions....
 
» Eleven Chrome vulnerabilities now updated
Another upgrade were done by the web giant as a response to the concern over the security of users....
 
» Wi-Fi data gathering done with intention
Google rejected the idea that they gathered Wi-Fi with intentions but Privacy International thinks otherwise....
 
» Group of SMS scammers in Malaysia now arrested
Lottery scam is the common method used by vicious. Fortunately, the group that used this in Malaysia was recently caught by the police....
 
» Doctor Who game bears an astonishing treat
Downloading game from P2P networks can actually bring danger....
 
» Virtualized desktop now on Trend Micros hands
There should always be a room for technological advancements....
 
» Bangladesh Facebook, rolling in the web again
Posting an offending photo will cause the ban of the social network in Bangladesh....
 
» Privacy endangered after a company was hacked
Greatest bidder takes all....
 
» Security software found with tiny bugs
Even security programs can be have little vulnerability of its own....
 
» Rent out a botnet in the market only pounds 5.99
Shutting down online applications of various groups become easier since there are cheap botnets available on the web....
 
» UKs ICO handed professional advice to Google
ICO suggests that Google deletes all its stored Wi-Fi data but other groups believe otherwise....
 
» New glitch spotted on Apple Safari
New glitch was found in the Safari browser for Apple operating system and this allows activation of code by abusive criminals....
 
» FIFA spam spreads terror in the web once again
The theme of FIFA is used by the online criminals once again in order to spread large volume of spam mails....
 
» Widespread DOS, a caution from VeriSign
There are multiple reports about the rampan DDoS attacks and users are told about the necessary actions in order to protect their systems....
 
» User privacy in Facebook endangered by the new bug
Facebook experienced a glitch on Wednesday but it was quickly fixed after the managers receive a report....
 
» Case closed on the theft by an IT consultant
The IT consultant responsible for the theft in a bank received his 63 months of imprisonment on Wednesday....
 
» Credit card details found to be distributed by Blippy
Blippy was found to have been distributing credit card details through search engines. However, the administration denied the fact and defended that this only happened during the beta test....
 
» Google Chrome security threats patched up
The threats that were found in the Windows-compatible Google Chrome browser were all patched up and now more convenient for the users....
 
» Cross-channel authentication in UK, now available
A valuable tool has been released by RSA Security in order to assist many groups that are in need of security against widespread cases of scam....
 
» iPhone unlock function faked into DNS Trojan
A new yet previously used tactic has be haunting the online community using the inviting idea of an iPhone unlock utility....
 
» False patch ruins different branches of computer systems
The latest update of BitDefender resulted to a damage in different applications because the system files were detected to have been infected with Trojan....
 
» Google web scanner now available
Google produced another service, which helps in spotting vulnerabilities in different computer programs....
 
» Facebook Victimized by Erotic Clickjacking Exploit
Just three days ago, the administrators of Facebook blocked a clickjacking bug that showed images of a barely dressed woman on the profile pages of unsuspecting users....
 
» The Anti-Cyber Crime Unit of the FBI
In a congressional hearing conducted this week, the FBI outlined how its anti-cyber crime taskforce will get the job done when it comes to IT security....
 
» NSA Empowers Windows 7 Security
The National Security Agency has helped a lot in beefing up the IT security measures of Windows 7, and is now providing the same service to Red Hat, Sun Microsystems, and Apple....
 
» SSL Renegotiation Vulnerability Exploit in Twitter
A Swiss researcher has just demonstrated how serious the Twitter SSL renegotiation vulnerability really is. ...
 
» The Cyber Warriors of Britain go into Battle Next Year
The online soldiers of the United Kingdom are moving onward to the cyber warfare front on March 10, 2010....
 
» Daily Cyber Security Hazards Federal Agencies
The CDW Government released a report that outlined the standard cyber security threats that companies face on a daily basis....
 
» Rogue Trader Recommends More Intelligent Regulation
The Nick Leeson lesson for today is that better regulation will help a lot in avoiding financial disasters. ...
 
» McKinnon Case Defense Tactics Criticized by Ex-FBI Officer
Ed Gibson, a former FBI officer, has heavily condemned the methods adopted by the defense team of hacker Gary McKinnon. ...
 
» Ex-NASA Employee Arrested Selling Classified Informa
A top NASA scientist that assisted in the discovery of water on the moon has just been busted for leaking satellite intelligence to Israel....
 
» The Identity Theft Survival Guide
The modern-day virtual criminal is a devious fellow that can outwit even the savviest of consumers because of his intricately done spoof sites that look just as legitimate as the real thing....
 
» Hacker Scare Tactics Help Sell Rogue Security Programs
According to the results of the Symantec Rogue Security Software Report, cyber terrorists are using scare tactics to scam users into buying their faux security programs....
 
» Newest Cain & Abel Version Now Available
The latest version of Cain & Abel (a password-retrieving program that covers the services of multiple hacking applications into a single freeware tool) has just been released....
 
» RAND Alleges Cyber Defense Better Than Offense
According to the RAND Corporation, the U.S. should focus on defense or prosecutorial, economic, and diplomatic action instead of offense or strategic cyber warfare against hackers....
 
» Old Wal-Mart Cyber Attack Exposed
Back in 2005 and 2006, Wal-Mart became a victim of a major security breach wherein cyber terrorists siphoned their website source code and other critical information to an Eastern European computer....
 
» Old Pedophile Secretly Videotapes Teenagers Internet
A man in his forties posed as a seventeen-year-old teenager so that he could trick girls into performing sexual acts on camera via video chat rooms....
 
» Man Partly Responsible for PayPal Hacker Certificat
The account of a white-hat hacker was suspended by PayPal on Tuesday after his research was used by another hacker to publish a counterfeit SSL certificate for the payment service....
 
» The Sybase Adaptive Server Enterprise Benchmark
A security benchmark has been created for the Sybase Adaptive Server Enterprise this week....
 
» Internet Banking Scam Upturn Trumps Plastic Fraud
According to the figures that the UK banking industry published last Tuesday, Internet banking scams caused 39 million pounds worth of losses in early 2009. ...
 
» Guide to Scams, Hacks, and Other Online Terrors
Because Internet hoaxes have become more complicated and dangerous, Network Box has created a special guide that shows users how to be more vigilant against hoaxes, cyber attacks, and other Internet h...
 
» Wyse Thin Client Device Susceptible to Exploit Vulns
A famous slimmed-down client gadget used by Fortune 100 companies, military contractors, and nuclear labs has been discovered to be weak against exploits, which puts whole multitudes of the appliances...
 
» Two Guides to Building a Cyber Security Business Case
Increase your Cyber Security line of defense is very essential networking solution....
 
» Study Shows Employees Bypass Network Security
New research conducted by the Ponemon Institute reveals a severe lack of enforcement and awareness of security regulations within companies nowadays....
 
» Hacker Challenge Proves StrongWebmail Wrong
StrongWebmail has finally conceded that a group of non-criminal hackers has defeated its security system challenge and won a total of $10,000. ...
 
» Crypto Attack Finds Chinks in Algorithm's Armor
Cryptographers from Sydney, Australia have found a way to break the SHA-1 digital-signature algorithm....
 
» Hacking Scam Yield Hacker $112,000 Total Earnings
A hacker from Hampton, New Hampshire was convicted of fraud charges for his scam to use trojans to empty the brokerage accounts on his targets' PCs....
 
» Mega Patch Gift from Microsoft Next Week
On Thursday, Microsoft announced that it will send over ten security patches, fixes, and updates to repair serious vulnerabilities found within Microsoft propriety software by next week's time....
 
» Bing Gets an Extra Pornography Filter
Microsoft has included an additional pornography filter to its Bing search engine in order to block persistent pornographic content from slipping via the Smart Motion Previews service....
 
» Gamer Hacks Bank Balance of Spymaster Game
An irritating micro-blogging game has been hacked through a funding exploit that eventually led to a wealth redistribution spree of in-game cash....
 
» Trojans Nestled into ATMs from Eastern Europe
Security specialists have uncovered a whole group of information-thieving trojans nestling themselves into ATMs across Eastern Europe for over a year and a half....
 
» Data Breach Lawsuit Aimed at Security Auditor
More than four years after the CardSystems Solutions Hack of 2004, the auditor of the company...
 
» Microsoft Offers DirectX Hole Patch
Microsoft is now offering an easier way to create a workaround for the latest vulnerability in DirectX....
 
» Obama Admits Government Unprepared For Cyber Terrori
Last Friday, President Obama addressed that the U.S. government was not as prepared as it should have been in responding to the recent bouts of cyber terrorism plaguing the country....
 
» Reaction to Obama's Cyber Security Speech Optimistic
President Obama's cyber security speech on Friday has left the cyber security industry abuzz about who the new "cyber czar" will be....
 
» Best Video Twitter Worm Spreading Rapidly
Twitter users beware! Clicking on the link "http://juste.ru" found in a repeatedly spammed tweet will result in your account getting infected and compromised by a dreaded and widespread web worm....
 
» Nokia 1100 Can Be Used For Hacking Banks
According to a fraud investigation company, the urban legend about the Nokia 1100 mobile phone's capability to hack into bank transfers is very much true....
 
» Hackers Harboring Anti-American Sentiment Breach Mil
Investigators are currently subpoenaing records from Yahoo, Microsoft, and Google for an ongoing probe of an anti-U.S. hacker group's infiltration of military servers. ...
 
» Obama Set to Create Cyber Coordinator Position
President Obama braces himself in announcing the newly created post of "cyber coordinator"....
 
» Will Secunia's PSI Guarantee Secure Web Surfing?
Secunia's PSI (Personal Software Inspector) is a comprehensive application that not only inspects installed programs for online updates ...
 
» Romanian Immigrant Punished for Online Fraud
A Romanian immigrant that currently resides in Michigan was sentenced to eight years and six months for swindling 7,000 individuals via his phishing expeditions....
 
» Webcam Users Guide against Hackers
Because of many a user's persistent and erroneous beliefs about webcam hacking, this article has been written to clarify several issues about the oft-underestimated phenomenon....
 
» Symantec-Murdered Password Tool Resurrected
The seminal password tool named L0phtcrack returns long after Symantec halted further development of the application....
 
» Video of Hacker Terrorism: Hoax or Truth?
Is the Internet video of hackers playing Space Invaders with the lighting controls of a skyscraper an indication of a cyber terrorist apocalypse or just a simple web hoax? The answer will probably not...
 
» Man-in-the-Middle Attacks More Complicated Than Prev
An SSL expert warns that there's more to man-in-the-middle attacks than users think. To be more specific, browser problems and other factors are responsible in making this hacking method so effective ...
 
» Offline Update 6.0: Update without the Internet!
With Offline Update 6.0, your fresh Windows and Linux installations can be updated without the need to head towards the Internet and risk hacks and worms in the middle of getting patches....
 
» Microsoft's Tool for Secure Software Development Released
As part of the SDL (Security Development Lifecycle), Microsoft has created a tool that allows developers to incorporate the information stockpiled through SDL into their software development environme...
 
» E-commerce Lacks Consumer Trust
Marketers using the Internet to sell their goods find it difficult to earn consumer trust because of the ongoing threats of spyware, spam, phishing, and identity theft....
 
» Sun Shareholder Lawsuits Undermine Oracle Takeover
Sun shareholders are filing three class action lawsuits against software giant Oracle in an effort to stop the $7.4 billion acquisition deal....
 
» Microsoft Ad Targets Apple's Artist Audience
Does Microsoft even know how to appeal to a demographic normally associated with Apple? ...
 
» U.S. Air Traffic Control Systems Breached
According to a recent government report, hackers were able to penetrate and partially shutdown an air-traffic data system in Alaska partly because of the modernization efforts of the FAA....
 
» European Union Parliament supports Internet freedom
The EP has voted in favor of Internet freedom, but the Council remains opposed to the idea....
 
» Security Update will solve Adobe Flash Media Server's
Adobe discovered a vulnerability in its Flash Media Server, but all it takes is a Security Update to fix this....
 
» Twitter hacker viewed celebrities personal info
French hacks Twitter; celebrities' personal info, among others, jeopardized...
 
» 16-year-old Swede hacked Cisco, NASA, and others
Encroachment of NASA and Cisco, among others, traced to a 16-year-old Swede....
 
» Electronic health records not hack proof
The recent shift to electronic health records from the old filing system may not be as safe as they are supposed to be, but companies are taking advantage of this to offer companion services to enhanc...
 
» Faulty HTTPS implementations risks users
Potential protection - a fact that hackers may have been exploiting to gain access to restricted services...
 
» Federal agencies complying to ever stricter standard
This is despite some sentiments that the security measures and protocols can sometimes be quite complex....
 
» Hackers outsourcing captcha-bypassing activities
Hackers take advantage of cheap labor to break into social networking sites....
 
» Theft of government laptop sends residents into panic
Data obtained from a government employee....
 
» Obama's helicopter details leaked via P2P
P2P clients may have unwittingly compromised security plans of President Obama's helicopter and may have possibly leaked it to Iran, a report shows by an online security group....
 
» Obsolete phone fetching staggering prices due Crimin
Phone Fetching abused by criminals...
 
» Twitter hacker gets job for his efforts awarded
Analysis from certain companies. This is amid growing concern that this trend may start influencing other individuals trying to break into the industry. ...
 
» Worm uses familiar brands to lure people
Worm disguise, in this case a mass-mailing e-mail worm....
 
» Microsoft learns of successful RPC worm infections
Microsoft learn but the software maker says some companies are learning the hard way by failing to deploy the update....
 
» Apple iPhone 2.2 update includes critical security
New iPhone update with security fixes...
 
» Bakasoftware Russian Scareware Named and Shamed
Russian Scareware Bakasoftware ...
 
» Lab Screens Evidence That Personal Records Are Leaking
Bank leaking out from data centers. This agitating drift is the result of companies improperly casting away of used data storage products at end-of-life, admitting a arising practice of merchandising ...
 
» United States Senate candidate has email hacked
US Senate email hacked...
 

➤ FREE SERVICES
Free Vulnerability Scan

Free Webinar

➤COMPATIBLE WITH
hipaa compliance, cve compliance
➤AWARDS & REVIEWS
SecPoint CO2 Neutral
SecPoint Trustpilot Score
Best IT Security Products