UTM VPN Firewall - Vulnerability Scanner - Wifi Password Pen Test
SHOP
CLOUD
VIP
Sun Sun Sun

You are here: Home > SecPoint Blog

SecPoint Blog - Follow the latest IT Security News TV Show and news here

IT Security News RSS Feed
» IT SECURITY NEWS
 
» Is your router Vulnerable to the NetUSB or Backdoor
Is your router one of the many millions that are wide open to attack? Scan your site for free and find out....
19 June 2015
 
» Court Rules NSA Data Bulk Collection Illegal
The NSA Phone reconnaissance program, initially unveiled by the previous NSA worker and informant of worldwide observation Edward Snowden, ruled unlawful by a New York government requests court on Thu...
08 May 2015
 
» How to NUKE DoS your Wifi Access Point eaisly
How can you find out if your wifi access point is being attacked by remote hackers and taken down?...
23 January 2015
 
» Signup for Free Vulnerability Scanner Webinar
Learn the latest about the Penetrator Vulnerability Scanner sign up for free Webinar...
24 November 2014
 
» IT Security Tv News Show 12th November 2014
Watch the 12th November edition of the IT Security TV Show...
12 November 2014
 
» Find out if you are vulnerable to Poodle Heartbleed
Free Scan to find out if you are vulnerable to Poodle, Heartbleed vulnerabilities...
11 November 2014
 
» IT Security News Show 4th November 2014
Watch the weekly IT Security News show new edition from 4th November 2014...
04 November 2014
 
» SecPoint IT Security News TV Show 21 October
Click to watch the latest SecPoint IT Security Weekly TV Show from 21 October...
21 October 2014
 
» Weekly IT Security TV Show 14 October 2014
Twitter Sues Government, News on Snowden and much more...
14 October 2014
 
» Weekly IT Security TV Show 7 October 2014
IT Security News TV show 7 October 2014...
07 October 2014
 
» Weekly IT Security News TV Show 30 September 2014
IT Security Week TV News Show 31 September 2014...
30 September 2014
 
» Are you vulnerable to the new Shell Shock Shell bug
New High risk vulnerability hits Linux, Mac OS X and embedded devices...
25 September 2014
 
» Weekly IT Security News TV Show 22 September 2014
View the 22 September 2014 edition of the weekly IT Security News show ...
22 September 2014
 
» Run 3 antivirus scanning engines at the same time
No one single Anti Virus will find all virus possible. So the cure is to run up to 3 at the same time...
28 August 2014
 
» 10 tips for using web vulnerability scanner
Vulnerability Scanning 10 tips...
23 July 2014
 
» 10 tips to a secure network Click to find out more
Secure your network before it is too late 10 simple tips...
22 July 2014
 
» 10 tips to a secure Wi-Fi Close vulnerabilities clic
Wifi security Tips...
21 July 2014
 
» Top 10 tips for using a firewall
How to use a firewall securely...
18 July 2014
 
» 10 tips for using vulnerability scanning
Tips for Vulnerability Assessment and Vulnerability Scanning...
18 July 2014
 
» How to Perform a Hipaa Vulnerability Scan
Hipaa vulnerability scan made easy...
07 July 2014
 
» Major Cyber Attacks in 2014 hacking on the rise
Discover more about major Security Attacks in 2014...
27 June 2014
 
» Hidden trick how to Super Boost Virtualization Speed
Increase easily 30-40% the speed of your Virtual machine such as Portable Penetrator with Hidden trick...
25 June 2014
 
» Get the Best IT Security Products in Israel Local
State of the art IT Security in Israel...
09 June 2014
 
» How to choose Vulnerability Scanning Profiles
Find out how to easily choose between 9 profiles when performing a vulnerability scan...
07 June 2014
 
» How to submit a security vulnerability to the database
Easily submit a security vulnerability in to the database...
06 June 2014
 
» Hyper-V Vulnerability Scanning Virtual Software Image
Microsoft Hyper-V Vulnerability Scanner Software Virtual Image...
31 May 2014
 
» What are the weaknesses of vulnerability scanning?
Discover more about What are the weaknesses of vulnerability scanning?...
26 May 2014
 
» Penetrator Vulnerability Scanner Helpdesk
Vulnerability Scanning Management Ticket System...
19 May 2014
 
» Weaknesses of penetration testing
Learn more about Weaknesses of penetration testing...
11 May 2014
 
» What are the weaknesses of UTM?
Are there any limits of a UTM Firewall Appliance...
10 May 2014
 
» What are the weaknesses of website security?
Website Security Strength and Weaknesses...
09 May 2014
 
» How to Perform Quarterly Vulnerability Scanning
Easily setup quarterly vulnerability scanning on your local and public networks...
02 May 2014
 
» Difference between firewall and a UTM appliance
Do you need a Firewall or a UTM?...
02 April 2014
 
» Differences between vulnerability assessment and vuln
Find out what the difference is on vulnerability scanning and vulnerability assessment...
31 March 2014
 
» Difference between WPS and WPA cracking
Learn how attackers compromise WPA and WPS...
31 March 2014
 
» Top 10 UTM Firewall functionality
Ultimate Top 10 UTM Firewall Functionality revealed...
30 March 2014
 
» IT Meltdown faced by RBS group hitting hard Festival
Customers of Ulster bank, RBS and Natwest are severely hit by a latest IT Meltdown...
04 December 2013
 
» Vodafone Users details hacked by Turkish hackers
According to various sources, Vodafone Iceland has been hacked, and it has left 77,000 records of various users at risk. ...
03 December 2013
 
» Messages can crack Googles Nexus 4 and Nexus 5
A class 0 SMS can now crash a remote Google nexus phone, which has recently been published by a Dutch security expert...
02 December 2013
 
» Game on for security experts in Estonia
In Estonia, some lucky professionals of INFOSEC will get paid to play a cyber war game, which emphasizes on a large scale cyber attack....
27 November 2013
 
» Mark Zuckerbergs take on US government activities
Some people or organization may think that founder and creator of Facebook, ...
26 November 2013
 
» Racingpost is facing a tough time: know more
One of the biggest and the best racing and gambling portals, racingpost.com is undergoing a security breach, which has left many of its loyal customers at risk. A recent security breach happened on Ra...
25 November 2013
 
» A loophole in Google change password system
Google recently fixed a huge bug, which was present in Gmail’s change password system, which had the power to open up the account details of any user in front of a skilled cracker...
23 November 2013
 
» Is your new LG TV really the spy next door?
LG recently admitted that some of its latest televisions sets have been found to log the viewing habits of its viewers, and that too without their permission...
22 November 2013
 
» Experts Warn the Hacking of Obamacare website
Many Hackers have already tried to attack and hack the website from Obama which is on medical insurance...
20 November 2013
 
» SSL Data Encryption to Enhance Security for Yahoo
Yahoo Incorporation has undergone the stress of malwares and Trojan Horses to be corrupting the internet systems and the offline systems too...
19 November 2013
 
» iOS7.0.4 Launched to Curb Hacking User Accounts Sans
The Apple Incorporation has launched a new operating system, iOS7, to scrutinize the unwanted hacking. People who are anti-social elements try to hack the user name from the registered users. ...
18 November 2013
 
» Save dolphins or face some IT security threats
A group from USA famously known as EUTNAIOA has recently warned Japanese government that they will start a series of online attacks ...
18 November 2013
 
» Warning From Facebook to safeguard their users
Facebook is warning its users to secure their passwords, because recently some updates from adobe urged its users to subscribe to its new service, which would keep them updated regarding latest update...
15 November 2013
 
» Switched Off or Powered Off Handsets Now Traceable
The first hand news that we all receive in the morning papers on November 13th 2013 is National Security Agency’s poised to locate the cell phones of any person for the last one thousand locations...
14 November 2013
 
» Sabotage Focused Malwares Hit Critical Infrastructur
The posts seize critical infrastructures and their vulnerability to get affected by the atypical malwares is a serious affair...
13 November 2013
 
» Telecommunications Cyber Crime in US! FBI finds the loop
Telecommunications Cyber Crime in US! FBI finds the loop...
12 November 2013
 
» Offline Malware Stuxnet Hit Iranian and Russian Power
The situation if present within the systems and the situations where the malware spread is through Internet Operating Systems and servers, things look under control. ...
12 November 2013
 
» Threat Track Security vs. Cyber Espionage! Huge Reveal
According to the recent studies from the “Threat Track (TTS) Security”, approximately six out of 10 malware system analysis at the United States the enterprises have actually investigated or have addr...
11 November 2013
 
» New Joiners in the FBI list of Most Wanted
New Joiners in the FBI list of Most Wanted...
07 November 2013
 
» Apple Discloses Privacy report details
As per Apple, the maximum number of requests received is for information from law implementation departments regarding stolen or lost apple units....
06 November 2013
 
» Ninety Eight Percent Dummy Accounts on Twitter! Beware!
Reports state, the total number of proximal sellers who are seen tracing Twitter followers on the eBay web portal has gone high from 20 in the month of June to more than 52 this November...
05 November 2013
 
» IT Security Threat by Anonymous in Singapore!
SINGAPORE - Activist group though Anonymous have hacked the website of a newspaper “Friday” about Internet freedom in Singapore city....
04 November 2013
 
» United States tapping Google and Yahoo Centers revealed
The Washington Post, 30th October 2013: The varied citing documents have been obtained from the former National Security Agency’s contractor Mr. Edward Snowden ...
01 November 2013
 
» Mozilla wins by Google Inc in geo location look ups
A few times back the Google Inc. got along a fearful trouble there by recording various locations of the Wi-Fi transceivers without letting the owners know about this or without seeking permission. ...
31 October 2013
 
» IT Security drives Bulk Hiring! Find out Where
Companies are in the hunt of IT security officials adept and well versed with cyber security systems, ...
30 October 2013
 
» IT Security and its Optimization
Drawing to our global as well as uncompromised and independent perspectives, the dedicated teams of IT experts...
29 October 2013
 
» Top Five IT Security Threats See if you are vulnerab
Our electronic and safety devices have formed a big space in our lives in today’s world...
28 October 2013
 
» IT Security Obligations to mitigate risks everywhere!
The definition if the phase for varied security needs must be the first step towards the implementation of any IT security policy. ...
26 October 2013
 
» IT Security spending reaches to $ 639 Billion 10 Yea
IT Security spending reaches to 639 Billion in just 10 years...
25 October 2013
 
» Photos in the UK are now commercially free for all
If you are one of the many who like sharing photos online on the most popular social media networks, you are affected by this new legislation that has been passed in the UK....
30 April 2013
 
» Government pressures companies to allow spying
Government and big companies clash regarding the issue of customer surveillance. The government is increasing pressure on communications and social media companies to find ways to comply with wiretapp...
30 April 2013
 
» Pentagon supports troops using Chinese technology
American troops in Africa are utilizing the Apstar-7 satellite for their communication needs. The Apstar-7 is owned and managed by state-controlled China Satellite Communication Company’s subsidiary....
30 April 2013
 
» White House sides with Privacy groups by offering
With all the opposition the Cyber Intelligence Sharing and Protection Act (CISPA), the final nail was put to its coffin when the White House stated the intent to veto it if Senate passed it into law. ...
29 April 2013
 
» Direct 3rd party application updates not allowed
Google Play revises its terms of use to prevent mobile applications from direct 3rd party updates. Facebook is directly affected as its Android application has a silent update feature that does not go...
29 April 2013
 
» Proposed new legislation seeks to defend e- mail
The US Senate passed a bill that requires a “probable-cause” warrant before granting access to e-mail and other private information stored in the cloud. Whether this bill will survive deliberations is...
26 April 2013
 
» Government censorship requests are rising, reports Google
Governments are censoring more and more online content. This is what the newest Google-released transparency report revealed. Governments all over the globe have made 26 percent more requests to remov...
26 April 2013
 
» Security Experts among others get free PR due Boston
Security firms take the opportunity to present their answers on how to prevent bombings like the one done in Boston from ever happening again while others groups take advantage of a little PR....
26 April 2013
 
» Non-Hacker convicted of Hacking
David Nosal after a short two week trial was convicted by a law designed to prosecute hackers even though his crimes could not be considered as how traditional hacking is defined....
25 April 2013
 
» Online Targeted Ad Escalation Imminent
Online advertisers, web browsers, and site owners fighting over how personal consumer information is used to target ads. Each group has interests that shed light on future problems that the individual...
25 April 2013
 
» Supreme Court allows WikiLeaks Donations
Supreme Court of Iceland sideds with WikiLeaks saying it should be able to receive donations using the payment processor Visa Iceland. It warns that if the ruling is not upheld, the payment processor ...
25 April 2013
 
» Twitter Plans to Beef up Security
Twitter is in the process of changing how users log into its service. It plans to add an additional authentication feature besides the current use of passwords. It is currently in the stage of interna...
24 April 2013
 
» Dow fluctuates because of Tweet
A group of hackers called Syrian Electronic Army caused the Dow Jones Industrial Average to briefly drop 140 points with the use of false reports spread through a hacked Twitter account of the Associa...
24 April 2013
 
» CISPA, A Double Edge Sword Privacy Concerns
With the new CISPA law in the US, the government can now use crowd-sourcing of cyber threat intelligence to pinpoint commonalities of cyber attacks....
24 April 2013
 
» NSA tests Military Hacking Prowess
The National Security Agency held a four day hacking contest which it dubbed the 13th Annual Cyber Defense Exercise (CDX). The US Air Force Academy dominated the competition continuing its second year...
23 April 2013
 
» Routers Requiring Attention Security Holes
A majority of popular router models are vulnerable to exploits and are quick to spot by hackers within a network. A security firm went out to verify and test just how vulnerable some models of routers...
23 April 2013
 
» UK businesses frequent target of hackers
A 2013 government research report shows that in the past year, more than 80 percent of businesses in the UK have suffered breaches in cyber security. Big businesses are having the worse of it since th...
23 April 2013
 
» 2Mbps downloads for UK by 2015
Secretary Maria Miller optimistically asserts the government project Broadband Delivery UK will be able to provide more than Britons with 2Mbits per second downloads by 2015 despite conflicting report...
22 April 2013
 
» The Secret of Siri Revealed 2 Years developments
After the continuous prodding, Apple finally clarifies that Siri kept an archive of inquiries from its users for two whole years to help improve its services....
22 April 2013
 
» A Picturesque but Silent Cyber war
Recently, there have been many emergency security patches being released as well as companies being targeted by cyber attacks. Efforts in company espionage continue to escalate regardless of the opera...
22 April 2013
 
» Mysterious Malware Invades PCs All Over the UK
Thousands of British PCs are being spied upon via malware by a Big-Brother-like organization, but it remains a mystery who exactly did it and for what purpose was all this done....
19 April 2013
 
» Your Machine Could Be Turned Into a Bitcoin-Mining
The online outlaws of the Worldwide Web are at it again, and this time around their modus operandi centers on compromising your PC so that it could serve as their slave for Bitcoin mining....
19 April 2013
 
» Boston Marathon Bombing News Taken Advantage of by
The Boston Marathon bombing is understandably the number-one searched news item, and malware domain squatters are taking advantage of this fact in order to victimize concerned citizens who want to kno...
18 April 2013
 
» Pirate Bay Cofounder Indicted for Hacking Plot
Gottfrid Svartholm, Pirate Bay's cofounder, has been indicted with charges of hacking that's separate from his one-year prison sentence for founding the illegal file-sharing site....
18 April 2013
 
» Java Undergoes Critical Fix by Oracle
The database giant Oracle has issued yet another critical patch for the widely used Java code in light of what's been happening to servers making use of the app (it's presently one of the most exploit...
17 April 2013
 
» Ex-Military Hacker Hired by Google
The US Department of Defense's clandestine military research bureau had an ex-hacker who has retired after three years of service. He has recently been hired by Google....
17 April 2013
 
» Exposing the PayPal Bug That Exposed Privacy of Users
Security experts have released a more comprehensive report regarding the recently fixed SQL injection security hole that plagued the PayPal website a few weeks back....
16 April 2013
 
» 4chan Used as Announcement Board for Virginia Mall
4chan exposes itself to controversy yet again as the Virginia mall shooter went ahead and announced his crime (probably via his mobile phone) way in advance on the infamous image board....
16 April 2013
 
» Android App Brings Big Brother to Life
Big Brother is watching you... Android users. The New York Police Department is undergoing tests for an Android-based app that produces crime data and intelligence in the hands of New York patrol offi...
15 April 2013
 
» Microsoft Issues Patch Update to Fix Patch Update
An earlier Microsoft patch caused people to have problems restarting their computer, so Microsoft had to issue a patch to patch up the patch it issued earlier in order to fix the fix of a vulnerabilit...
15 April 2013
 
» Data Necromancy Is a New Google Feature
Postmortem data sharing is the new, latest offering of Google. The services Google offers... from Gmail to YouTube as well as Google Search... will now serve as the Ouija board for you once you kick t...
12 April 2013
 
» Spam Has Gotten Worse in Terms of Infection Rates
Even though spam control has gotten better with the evolution of anti-spam software, spam in general has gotten worse when it comes to infection rates, according to the newest AV-Test report on the is...
12 April 2013
 
» Fake Hewlett-Packard ScanJet Printer Messages Actually
The latest cybercriminal modus operandi apparently involves the use of spam messages containing links to malware sites disguised as fake Hewlett-Packard ScanJet Printer correspondence. ...
11 April 2013
 
» MDOP Improves Admin Abilities on Windows 8 PCs
The Desktop Optimization Pack management features of Windows 8 has been extended and deepened. MDOP (Microsoft Desktop Optimization Pack) is a management quite for IT that deepens IT administration ca...
11 April 2013
 
» Court Fight Exposes FBI Smartphone Surveillance Tool
Thanks to a court battle, the secrets to a smartphone surveillance instrument used by the Federal Bureau of Investigation (FBI) of the United States of America has been exposed and documented. The leg...
10 April 2013
 
» Your Email Address May Soon Be Your Only ID Thanks
Mozilla's new service, Persona Beta, allows you to login to Yahoo! password free because it's a service that ensures your email address may be the only thing you need to serve as your digital ID for t...
10 April 2013
 
» Another Round of Bug Squashing Happens on Microsoft
There are about nine patches issued for vulnerability fixes for Microsoft's applications for the Patch Tuesday event this April. The software conglomerate specifically locks down on privilege escalati...
09 April 2013
 
» Windows 8 Still Has Some Kinks with Microsoft Security
Windows 8 is still having problems with propriety Microsoft security applications, which means that even though these are programs are developed by Microsoft itself, they're acting like third-party so...
09 April 2013
 
» Israel Suffers an Onslaught of Cyber Attacks in the
The DDoS blitz of 4chan-originated hacker activist (hacktivist) group Anonymous rages on while Israel, in true form, waves off the new attack as if saying there's "nothing to see here" and whatnot, ju...
08 April 2013
 
» True Email Privacy Might Now Be Achievable Thanks to
Encryption was not free about 22 years ago until the team of Jon Callas, Phil Zimmerman, and the PGP group made it available for mass consumption without the exorbitant price. 22 years later, and the ...
08 April 2013
 
» Your Mobile Location Data Could Betray Your Identity
Your mobile location data could serve as a method of identifying individuals, which is why many proponents of privacy would rather the traditional, more anonymous method of mobile tracking technology....
30 March 2013
 
» Apple Home Ground Invaded by Microsoft Developer
From June 26 to 28, 2013, San Francisco's Moscone Center will accept Microsoft to host the upcoming BUILD Developer Conference, but two weeks prior, Apple will be hosting its own WWDC. Who among the t...
30 March 2013
 
» The Curse Word That Is Security and the Different
Security is called a curse word because of how taboo and nebulous its meaning is....
29 March 2013
 
» Judge Says Bank Blameless for Wire Fraud Victim's Woes
The victim of a cyber heist involving a $440,000 wire fraud was denied by the judge the right to sue the involved bank, claiming that the financial institution is blameless for the crime. More to the ...
29 March 2013
 
» SSH Cryptological Keys Ruined by NetBSD 6.0 Code Bug
A coding bug found in the NetBSD 6.0 code serves as a significant security loophole for cracker and hackers to invade the open-source operating system seemingly at will thanks to how it renders SSH te...
28 March 2013
 
» Microsoft Insists that It Didnt Release Skype Traffi
According to Microsoft's first report on how the organization handles official data requests from authorities, law enforcement never received any user content from Microsoft's Skype subsidiary....
28 March 2013
 
» Anonymous Mossad Leak Probably Fake and Bogus
The legion of hacktivists from 4chan known as Anonymous have claimed to leak 30,000 Israeli officer data, such as the country's secret service agency known as Mossad. Most experts agree that it's prob...
27 March 2013
 
» Historically Huge DDoS Attack Devastates Anti-Spam
The bad guys and spammers apparently won today after what is believed to be the biggest DDoS attack ever conducted in the history of man and the Internet. The apparent victim of the attack? Spamhous, ...
27 March 2013
 
» Uyghur and Tibetan Activists Victimized by Malicious
The highly targeted malicious software had been created to specifically target Uyghur and Tibetan activists, specifically their Android phones' contacts, phone data, geolocation, SMS messages, and cal...
26 March 2013
 
» Java Security Vulnerabilities Anew Trouble Users in 2013
If you're in charge of business computers for your company and they contain Java, then you might be one of 94% of all computers running Java that's vulnerable to attack... specifically a Java runtime ...
26 March 2013
 
» The Seoul Saga Malware Wipe Caused by Patching
The data wipe that happened last week in South Korea has devastated the nation. What's more, it was apparently caused by its existing network patching system; that's the reason why the malware was abl...
25 March 2013
 
» Don't Download Pirated Android Mobile Apps Because
It's a bad idea to pirate the Android keyboard because it could be used by hackers to login into your different important accounts, like your email or your online banking systems....
25 March 2013
 
» iForgot Password Recovery System Taken Down Thanks
For those who forget their passwords, iForgot won't be available to them, since Apple recently pulled their security system thanks to errors and possible security holes (ironically enough)....
22 March 2013
 
» Political Intrigue Leads to CTO Boss Bugging in Hoboken
Hoboken, New Jersey IT boss faces one and a half decades in jail after it came to light that he harvested emails of the mayor and staff to serve as a leak for the mayor's political competitors....
22 March 2013
 
» SCADA Systems and Their Vulnerabilities in Finland
Finnish security researchers have discovered that Finland could be facing a possible swarm of Internet hackers and crackers thanks to the fact that its Internet-facing SCADA (Supervisory Control and D...
21 March 2013
 
» Medical Research Firms Have Info Stolen by Cyber Spy
Malware zombies from cyber-espionage crews have been sent to pilfer intelligence data and information from medical research firms using a variety of methods, which includes spear-phishing and other s...
21 March 2013
 
» Malware Plague Cripples Korean Banks and Television
South Korean television and banking institutions ended up in a standstill of sorts after a network breakdown happened that disk-wiped everything in a chaotic cyber blitz. It's too early for them to po...
20 March 2013
 
» Honeypot from SCADA Attracts International Online
Honeypot industrial systems for controlling important equipment in the energy grid, factories, and airports... that is, any critical system... suffered sustained attacks within hours by worldwide cybe...
20 March 2013
 
» Microsofts Patch Tuesday Targets
Microsoft Patches for this month...
19 March 2013
 
» Finger Scanners can be Fooled by Silicone Finger
Finger Scanners can be Fooled by Silicone Finger...
19 March 2013
 
» 420,000 Node Botnet Came to Existence via Researcher
Researcher faces thousands of years in jail for good cause because the means does not justify the ends, and mapping out IPv4 Internet does not justify the questionable act of creating a 420,000 node b...
19 March 2013
 
» Human-Like Botnet Click Scam Exposed After Researchers
The profitable Chameleon botnet fraudster was able to make a monthly take of $6 million before analysts and researchers were able to crack its code and signature. It avoided clickbomb safety protocols...
19 March 2013
 
» Gray Hat Hacker Jailed for Hacking iPad User
Andrew Auernheimer, a gray hat hacker (a hacker that exhibits both the traits of white hat hacker penetration testers and black hat malicious crackers) is facing 41 months in prison for exposing priva...
18 March 2013
 
» Vulnerabilities Were Exposed from Huawei USB modems
Huawei USB modem users beware, for they've been deemed vulnerable and open to attack just recently, which serves as further evidence of a long line of proof of the company's poor security practices. ...
18 March 2013
 
» Update 10.8.3 for Apple OS X is here
10.8.3 for Apple OS X...
17 March 2013
 
» Java security problems not going to get better
Java security problems...
17 March 2013
 
» The Picture of Ever Worsening Situation of Cyber Crimes
Picture of Ever Worsening Situation of Crimes...
17 March 2013
 
» A Flaw Leading to the Doom of Your Systems Security
With the launch of this month’s security updates by the Microsoft, the horrors of the root kits like ...
16 March 2013
 
» Shares Tips to Remove Data from Mobiles
The trends of technology are changing at an exponential rate. Every day new gadgets come into market. ...
16 March 2013
 
» Kali Linux is Released Pentesting Distribution
Finally the 6th edition of Backtrack Linux is here. This time released under the name of ‘Kali Linux’. ...
16 March 2013
 
» Pwn2Own All browsers except Safari compromised
All browsers except Safari compromised...
15 March 2013
 
» Windows Machines Suffering from Numerous Vulnerabilities
If you're a Windows PC user and you've been suffering because of how seemingly exploitable your machine is, it's not actually Microsoft's fault, but instead third-party programs and their software sec...
15 March 2013
 
» $33-Million CCTV Hack Makes Oceans 11 Become Reality
In a move reminiscent of a Hollywood-style cyber heist, a CCTV hacking exploit was used in order to rob a casino blind of $33 million via high-stakes poker tournament scamming. This sophisticated sche...
15 March 2013
 
» How deep the Android Malware issue runs
Android Malware Issue...
14 March 2013
 
» Latest Development in NIST NVD Hacking Points Finger
Last time, it was reported that a software vulnerability was used to infect two servers of the National Vulnerability Database or NVD. It was later revealed that it the app security hole came from Ado...
14 March 2013
 
» All Security Techniques and Models Are Doomed to Fail
No matter what security model people come up with, these are all doomed to fail because of human error and the fact that progress entails new codes, new dynamics, and new paradigms for both attackers ...
14 March 2013
 
» Irony in the Hacking of the American National Vuln
The U.S.A's National Vulnerability Database proves itself to be vulnerable itself after it was itself attacked via malware infection and taken offline altogether....
13 March 2013
 
» Islamic Cyber Freedom Fighters Victimizes JP Morgan
The mystery web assassination of the American bank known as JPMorgan Chase by DDoS or distributed denial-of-service attack by Islamic cyber freedom fighters is just part of a series of financial insti...
13 March 2013
 
» Security Shop Breach Exposes PayPal Payments, Avast
The Avast security firm pulls a Pontius Pilate, washing their hands of responsibility over the breach on a German reseller website that leaked PayPal payment details from thousands of clients. ...
12 March 2013
 
» Indian Godzilla Wreaks Havoc in the Worldwide Web
Indian "Godzilla" hacker takes down 15 Pakistani government sites as revenge and protest for suspected terrorist activity by the nation's administration....
12 March 2013
 
» Security Holes Allow Cracker Pwn2Own Entrants 500K
Better luck next time for Oracle, Mozilla, Google, and Microsoft coders, because the annual Pwn2Own Contest had them "owned" by entrants who won $500,000 by easily cracking through their popular softw...
11 March 2013
 
» Chinese Outsourcing Flounders Thanks to Security Fears
Security concerns plague China's efforts to acquire IT jobs from American companies the same way India had in the past thanks to cyberespionage and IT security fears. There are in fact cyber spy progr...
11 March 2013
 
» Microsoft Updates for Windows, Internet Explorer Office
Microsoft schedules a Patch Tuesday update for the latest versions of Microsoft Windows, Microsoft Internet Explorer, and Microsoft Office applications around next week, this March 2013....
08 March 2013
 
» The $12,000 Hacking Heist of a Lifetime by Online
A daring $12,000 hacking heist has been perpetrated by hackers. This happened after several virtual brokerage accounts for a BitCoin transaction firm had been infiltrated and emptied of its digital ca...
08 March 2013
 
» The United States of America Is Spam Central
The USA remains the best place to send spam to, according to a study offered by Sophos. India was once the spam king, but it recently went to third place, and now the United States is now number one w...
07 March 2013
 
» Password Protector from Japan Uses Shadow Clone
A Japanese password protector does its job in typical weird Japanese fashion, which is to flood the screen with hoax or dummy cursors to prevent shoulder surfing and screen capture password theft....
07 March 2013
 
» Purloined Certificate Included Malicious Java Software
A stolen certificate from Clearsult Consulting is now available in Java applet malware form, which is why users must get their own Java and Oracle version updated post-haste for their own protection....
06 March 2013
 
» China versus Japan! Jinan Cyber War Ongoing
Malware that's believed to be created by the Chinese has been deployed against the Japanese. Is the ancient tension between China and Japan resurfacing in an online battlefield?...
06 March 2013
 
» White House Says Mobile Phone Unlocking Should Legal
According to the White House, unlocking should not be made illegal at all. They agree with the 114,000 signature petition to make unlocking legal again after the Digital Millennium Copyright Act deeme...
05 March 2013
 
» Mediator Anonymous Convenes Against Malaysian
In an unusual turn of events, pseudo-anarchist and hacktivist 4chan group Anonymous has served as a mediator between angry hackers from the Philippines and Malaysia (which is ironic, considering the a...
05 March 2013
 
» Google Now Ninety Nine Point Seven Percent Secure
When people go online and visit their favorite websites, they somehow expect that they (the websites) had taken the necessary steps to keep their networks safe from viruses, worms, and other types of ...
22 February 2013
 
» DDoS Attacks in 2013 Distributed Denial of Service
Have you ever experienced not being able to access an application from your computer? In situations like this, people would often feel helpless and confused, ...
22 February 2013
 
» China Reacted to the Mandiant Report Survalience
In the past, certain cyber attacks were launched against prominent individuals and sensitive organizations of the United States of America. Although, there was no solid proof, many people were pointin...
21 February 2013
 
» A Stronger Computer Worm Attacked Yahoo Instant Mess
Recent studies show that the three most common malicious software programs these days are the Trojans, the viruses, and the worms. Worms? . ...
21 February 2013
 
» McAfee and the Threats to Mobile Platforms Security
In the past, people can’t live without their PCs. It was like their whole world depended on it. ...
20 February 2013
 
» Mandiant Intelligence Center Linked China to Recent
A lot of hacking incidents affecting the media, business, and government sectors happened in the past, and most people had thought that most of these incidents were orchestrated by hackers coming from...
20 February 2013
 
» The Latest Hacking Attack of Anonymous Hackers Israe
In the past, Israel has been bombarded by cyber attacks coming from Anonymous Hackers. To those who just heard this term for the first time, ...
19 February 2013
 
» The Land Down Under Is A Comfort Zone for Hackers?
Hackers strike anywhere. Although, most hackers commonly target territories in the US, Europe, and Japan, it should be noted that no country is being spared by the cyber criminals. In fact, just recen...
19 February 2013
 
» Survey Reflected the Opinion of the People Cyber War
Humanity has experienced many kinds of war. Some were brought about by the desire to extend one’s territory like the Persian War, World War I, World War II, the Vietnam War, and the Gulf War. ...
18 February 2013
 
» New Cyber Threat Information Sharing Bill Gathered
Just recently, Representative Mike Rogers of Michigan (Republican) and C.A. Ruppersberger of Maryland (Democrat) reintroduced the controversial cyber threat information sharing bill. ...
18 February 2013
 
» Ransomware Group Got Busted Blackmail
Recently, the Spanish Police, in coordination with the European Cybercrime Centre (EC3) at Europol and Interpol, ...
15 February 2013
 
» Anonymous Failed to Interrupt the 2013 State of secu
Just recently, a hacktivist organization called Anonymous made an announcement that it plans to launch Operation SATU that will prevent the web broadcast of the...
14 February 2013
 
» Prankster Hackers Strike Again Who got Hit?
Have you seen a government warning or announcement flashed on your TV screens before? How did you feel? ...
14 February 2013
 
» UK Needs More Skilled Individuals to Fight Hackers
These days, people often hear news about other people getting victimized by hackers. It seems that everyone is being targeted by these hackers. Attacks are rampant. We see them on news programs, we he...
13 February 2013
 
» Some of the Best Internet Security Suites of 2013
A lot of internet security companies create security suites every year to see to it that people will have a way to defend themselves from such hacking attacks. However, there is a lot of security soft...
13 February 2013
 
» Hackers Take Advantage of Online Dating Sites
Right now, there are a lot of online dating sites that single people can visit in order to find their special someone. ...
12 February 2013
 
» Children Hackers Exist New Warfare Army Security
Hacking has always been one of the major issues these days. Everybody knows that it’s a crime and that it is punishable by law. However, even the law and the idea of punishment do not seem to deter so...
12 February 2013
 
» Online Shopping Tips on the Days of the Heart Trojan
Valentine’s Day is fast approaching. It is one of the events that the hopeless romantics and the young at hearts dare not to miss. ...
11 February 2013
 
» Secrets of the Bushes Revealed by Guccifer
Do you remember US President Bush? Which between the two – Former president George Herbert W. Bush...
11 February 2013
 
» Fitrianta Got Eight Years ffor hacking invalid click
The judges of West Jakarta District Court (last February 5, 2013) rendered their verdict to 'Cahya Fitrianta' who was charged of many crimes which included violating the provisions of the Law of Infor...
08 February 2013
 
» EU and Its Response to Cyber Crimes
As a response to cyber crimes, many countries now are gearing up to fight the so-called modern criminals � the cyber criminals. ...
08 February 2013
 
» Obama and the Cyber Warriors hacker attacks army
Cyber attacks now are very common. Japan, just recently held a contest to find the best hackers they have to counteract future cyber attacks that would be launched against them. US institutions and ag...
07 February 2013
 
» Trojans Most Common Malware Infection Are you hit?
Pandalabs (previously called Panda Software and a computer security company founded in 1990) released a report about data pilfering, hacking attacks and cyber wars...
07 February 2013
 
» Japanese Government Sponsored A Hacking Contest
Hacking has always had a negative connotation. Any why not? ...
06 February 2013
 
» A Call to Change US Cyber Crime Law
In 1984, in response to the growing instances of computer hacking and identity theft incidents that happened in the US, the US Congress passed a bill that would lessen if not totally eradicate hackin...
06 February 2013
 
» Schrooten Got 12 Year Jail Time
Last February 1, a Dutch citizen was sentenced to prison for 12 years by US District Judge Ricardo S . Martinez. Unlike any other criminals , David Benjamin Schrooten is a modern day felon. ...
05 February 2013
 
» Hackers Attacked US DOE Confidential Info Leaks
It is known to everyone that a series of hacking attacks was launched by an unknown group of cybercriminals against some of United State’s major companies. These attacks targeted the systems of The Ne...
05 February 2013
 
» New Botnet Threats in Latin America
Cybercrime-- In the digital word that we live in now, this is the most common crime that is committed and yet very few get arrested. This happens not because no one is arresting them, but because cybe...
04 February 2013
 
» Twitter Social Network : Recent Victim of Hackers
Do you have a Twitter account? Have you been recently asked by Twitter to log in a new username and password? Were all you log in details totally reset? If you answered YES to all these questions, t...
04 February 2013
 
» Laptop docking stations may not be as safe as you imagined
In the business world the most important tool is information. The difference between having it and not having it can be the difference between success and going bust. That is why corporations invest a...
01 February 2013
 
» U.S. media under cyber attack foregin hackers attack
Today cyber-attacks have become something ordinary and we got so accustomed to them that we no longer pay attention to them. But when the cyber-attacks focus on a public institution or an important bu...
01 February 2013
 
» 50 Million Various Devices At Risk Due to Flaws in The Sec
The UPnP is having security issues because of the networking and routers. This is causing problems for users when they buy new devices such as laptops, printers, and other electronic devices...
31 January 2013
 
» 16,000 Credentials From Facebook Have Been Robbed
There have been thousands of people that have found credentials mssing from their Facebook page and this is causing issues because hackers are finding ways to get into accounts....
31 January 2013
 
» Stoke-on-Trent City Council Punished for Privacy Gaffe
Thanks to a blunder by the Stoke-on-Trent City Council's legal department, it's now facing a £120,000 fine for emailing sensitive information to the wrong person. ...
31 October 2012
 
» French Euromillions Website Hacked by Religious Type
Around October 27 to 28, the "Moroccanghosts" hacking crew decried the French lottery website Euromillions as a den of sin and depravity that does the work of the devil....
30 October 2012
 
» Fraudster Claiming Ownership of Facebook Arrested
Paul Ceglia, a person who claims half-ownership of Mark Zuckerberg's social network giant Facebook, has now been charged with the crime of fraud. ...
30 October 2012
 
» The Future of Software Is in Non-Volatile Memory
There's a new memory technology out there that makes it possible for software to be stored in a non-volatile memory (NVM) format. It is system memory and mass storage in one....
29 October 2012
 
» DVD Cracking and Console Modding Legalization Denied
Copyright holders have denied proposals last week in regards to making DVD cracking and jailbreaking video game consoles legal....
29 October 2012
 
» No One Is Safe: The Barnes & Noble Keypad PIN Hack
Just this Wednesday, it was revealed that customer bank card data was stolen directly from Barnes & Noble thanks to a keypad PIN hack security breach....
26 October 2012
 
» Mobile Technology Changes the Face of Cybercrime
A mobile malware alert has been posted by the Federal Bureau of Investigation (FBI), which shows that even tablets and smartphones aren't immune to the online outlaw menace....
26 October 2012
 
» Spying Tweets and Facebook Updates
A South African company has come up with a software application that's capable of gathering public online information that will help clue them in on the goings-on with a company or a person....
25 October 2012
 
» Spammer-Seized Money Donated to CSI Lab by Facebook
A cyber crime scene investigation (CSI) laboratory has received a significant donation from Facebook, which the latter seized from the ill-gotten wealth of spammers....
25 October 2012
 
» Government URL Shortener Service Abused by Spammers
Work-at-home scam spammers are using and abusing a URL shortener in order to go about their questionable business....
24 October 2012
 
» Killer Laptop Hack Against Pacemakers
Certain types of pacemakers have the ability to deliver a deadly shock to its owner, which can be induced via remote laptop or mobile device hack attacks by a hacker as far as 50 feet away....
24 October 2012
 
» Robotic Calling Cash Reward of $50,000 by the FTC
The Federal Trade Commission (FTC) has offered a reward amounting to $50,000 to anyone who can come up with a solution that will block robotic calling permanently....
23 October 2012
 
» The Truth about Passwords and Security
Security isn't just about two-factor authentication, antivirus software, and strong encryption of your password. It instead mainly involves the human factor towards security....
23 October 2012
 
» SSL Vulnerabilities Remain with Certain Android Apps
German security researchers recently uncovered that many popular Android applications posses some quite serious and critical SSL vulnerabilities that need addressing post-haste. ...
22 October 2012
 
» Is the United States Hypocritical about Cyber Terrorism?
The warnings of Leon Panetta, the U.S. Secretary of Defense, in regards to an Internet version of the September 11 attacks seem quite hypocritical in light of the U.S.'s own cyber sins, says a securit...
22 October 2012
 
» Anonymous Affiliate Takes Down HSBC Websites
Around Thursday night yesterday, Fawkes Security... a group linked with the infamous hacktivists known as Anonymous... hacked and hijacked HSBC websites using a packet flood DDoS....
19 October 2012
 
» Adobe Reader and Acrobat Now with Bolstered Security
Adobe has improved upon the security of the Adobe Reader and Acrobat XI with the inclusion of new sandbox protection features....
19 October 2012
 
» BEAST Attack Still Capable of Taking Down SSL Servers
Even though a year has already passed, SSL servers as well as about 70% of all sites still cannot thwart the threat of a JavaScript-based BEAST attack....
18 October 2012
 
» High-Bandwidth DDoS Attacks Are More Common today
High-bandwidth distributed denial-of-service (DDoS) attacks are more common nowadays than before, according to a security firm. ...
18 October 2012
 
» $400,000 Bank of America Heist Done by Online Outlaws
A now-frozen account used to pay the wages of Washington government workers had nearly half a million dollars stolen from it thanks to cyber criminals....
17 October 2012
 
» SMS PPI Spam Scam Blight Hitting the Mobile Phone World
A Payment Protection Insurance (PPI) scam that's sent via SMS is now recognized as the number one SMS spam-based scam around by AdaptiveMobile. ...
17 October 2012
 
» Anonymous Hacker Group Cuts Support of Wikileaks
The Anonymous hacking group has cut all ties with Wikileaks and its founder, Julian Assange....
16 October 2012
 
» Over 9,000 Cyber Criminals Arrested in China
China recently arrested about 700 crime gangs and over 9,000 cyber criminals in order to stop a PR racket to censor criticism and user-generated negative content ...
16 October 2012
 
» Sony Pictures Hack Perpetrated by LulzSec Hacker
Raynaldo Rivera, a LulzSec hacker, pleaded guilty in regards to his involvement in the hack attack of the Sony Pictures Entertainment website back in May 2011....
15 October 2012
 
» Information Technology Industry Supports Obama
The tech industry puts its money where its mouth is and provides donations to the Obama reelection campaign....
15 October 2012
 
» Should Bounty-Hunting Bug Finders Be Regulated?
Experts cannot come up with a consensus regarding whether or not bounty-hunting white hat hackers searching for vulnerabilities should be regulated....
12 October 2012
 
» US Defense Secretary Warns Future Cyber Attacks 911
The US Secretary of Defense alleges that future cyber attacks on American soil could rival the 9-11 terrorist bombings of the World Trade Center back in 2001. ...
12 October 2012
 
» Displaced Vendors in Cloud-Computing-Dominated IT
Vendors are currently feeling out of place in the Information Technology field thanks to cloud computing....
11 October 2012
 
» Skype Worm Has a Scarily Smart AI
The latest Skype worm is able to infect Skype installations worldwide by chatting users up before holding their computers hostage....
11 October 2012
 
» Pirate Bay Founders Go MIA During Conference
Even though they're due to speak on Wednesday, Pirate Bay founders were found missing in action at a Kuala Lumpur Hack in the Box Security Conference talk....
10 October 2012
 
» Small Business Are Not Taking Advantage of Mobile
A survey reveals that even though small businesses require the help of mobile device management solutions, they remain ignorant of them. ...
10 October 2012
 
» Adobe Flash Patching Underway for Microsoft IE 10
The newest Adobe Flash update contains 25 important vulnerability fixes, which is why Google and Microsoft applied these patches to their browsers post-haste....
09 October 2012
 
» Malware Infection Rate for Windows 7 Rises Dramatically
The malware infection rates for the Windows 7 operating system have risen significantly for 2012. ...
09 October 2012
 
» Philippine Government Sites Hacked Because of Anti
Because of concerns regarding the restriction of freedom of speech via the anti-cybercrime law, Anonymous Philippines has launched hacker attacks to Philippine government websites....
08 October 2012
 
» Telemarketer Computer Scammers Caught Red-Handed
The Federal Trade Commission or FTC is currently targeting scammers that use scare tactics to cheat consumers of thousands of dollars by pretending to fix their computers. ...
08 October 2012
 
» IBM corrects security report after criticism from Google
After revisiting their statistics, it turns out Google has no more critical security issues. ...
31 August 2010
 
» QuickTime found to be vulnerable to Code-execution exploit
All because of human error, Apple QuickTime is still at risk....
30 August 2010
 
» Hackers give Microsoft advance warning before attack
Even Hackers make mistakes. ...
29 August 2010
 
» Criminals continue DLL hijacking as developers Striv
Developers slowly addressing DLL hijacking vulnerability as Microsoft shares SDL knowledge and its DLL administrative tool....
28 August 2010
 
» Pushdo botnet Power diminishes to almost nothing
Pushdo spam slowly disappearing from e-mail boxes....
27 August 2010
 
» Pentagon improves its cyberspace security measures
Due to a wide spread malware incident 2 years ago, Pentagon implements a better cyber-security policy....
26 August 2010
 
» Microsoft specialists refute Apple's privacy policy
The privacy of end-users will be indirectly exposed. ...
25 August 2010
 
» Microsoft admits existence of application code-execution bug
Microsoft has no silver bullet for this security problem at the moment....
24 August 2010
 
» Speedport router WPA key a disappointment
Speedport W700V routers default security easily compromised...
23 August 2010
 
» Halo: Reached earlier than expected
Leaked right under the nose of the Xbox Market...
22 August 2010
 
» New tricks malware use to catch you off-guard
A new program that get you to uninstall your antivirus software for them to do their dirty work....
21 August 2010
 
» Code-execution bug terrorizes Windows
Code-execution bug reaps terror on Windows applications....
20 August 2010
 
» More secure VLC Media Player 1.1.3 released
The new VLC media player protects you from a security vulnerability affecting media players. ...
19 August 2010
 
» Studies show that Security Suites are getting left behind
Do antivirus companies really protect your computer? Find out how well they performed during testing....
18 August 2010
 
» Rivalry in the Warez Market Illegal Software Downloa
Hackers fight over warez forums. Sensitive data used as ammunition...
17 August 2010
 
» Cybercriminals get hacked Even Hackers hacked
What goes around comes around, it seems. Criminals included....
16 August 2010
 
» Lawsuit filed against Warner, Disney, and others
Lawsuits related to issues of privacy in the net have been filed against Clearspring Technologies and its clients which include well known companies....
15 August 2010
 
» Gift-card cloner on probation easily duplicate cards
Retailer stores, be extra wary!...
14 August 2010
 
» New wheels reveal vehicles location
Tire pressure sensors in vehicles don't use encryption which makes it open for attack...
13 August 2010
 
» Overlooked security bug in Facebook patched
500 million users of Facebook can now sigh in relief after a overlooked security bug was fixed....
12 August 2010
 
» NoScript misunderstood while XSS dominates websites
Most users are trading security over convenience when accessing the internet....
11 August 2010
 
» Dot-Matrix Printers insecure? How do hackers attack
Who knew the noise it makes reveals more than it should? ...
10 August 2010
 
» VxWork module creates security hole in networks
Operating system two modules causes Security risk to networks....
09 August 2010
 
» Thunderbird roasting in its own juices
Developers need to step up their game to get more competitive with other e-mail clients ...
08 August 2010
 
» Russian Hacker extradited and put on trial
Alleged ring leader extradited for stealing $9M worth of funds from RBS WorldPay...
07 August 2010
 
» Fake Facebook virus more troublesome than real one
Fake Facebook virus messages spamming Facebook users. Stop spreading this to your friends....
06 August 2010
 
» IPv6 Security Dillema Fortold at DefCon
New system causes New Problems and provides new answers. IPv6 coming soon!...
06 August 2010
 
» Cracking software can gain access to iPhone 4 passwords
Now there is no need to jailbreak iPhone 4....
05 August 2010
 
» Company payroll not immune to hackers
A pharmaceutical company that uses a third party payroll system was hacked, placing the payroll of employees at risk....
05 August 2010
 
» Adobe Reader still plagued with security flaws
Even the iPhone is not safe with this PDF Reader. Adobe needs to roll out more security fixes....
04 August 2010
 
» Fool-proof cryptography coming soon!
Securely send encrypted messages only to a specific place!...
04 August 2010
 
» Rootkits target Android devices
New rootkit demonstrated to affect Android phones. Beware!...
03 August 2010
 
» Promised critical Microsoft patch rolled out
Microsoft Security Patch was deployed as promised....
03 August 2010
 
» UK radio waves opened up for public scrutiny
UK Radio waves opened up for public scrutiny? Still, some secrets should be kept. Radio license database soon to be open to the public in 2011. Operators get ready!...
02 August 2010
 
» Cell phone call cracked like an egg
GSM Cellphone Security in Germany is in jeopardy! Better security measures needed....
02 August 2010
 
» Virtual security progresses in the market
Virtual security takes it lead and will flourish in the year 2014....
17 June 2010
 
» Apple improves the security of its popular products
Security of the Apple products are to be upgraded with the recently-released patches....
17 June 2010
 
» Testing rules improved by the anti-malware officials
The anti-malware governing body deided to improve the testing principles so as to have advanced security testers....
16 June 2010
 
» Criminal attempts frame-up and failed
A vicious criminal attempted to do hacking but met his ultimate failure....
16 June 2010
 
» Amplify call center payment security, says Veritape
Security in the call centers of UK can now be tightened up with the vendor's newest product....
15 June 2010
 
» Web giant appears with a come back
The agency requests for an explanation and the giant returns with a detailed reply....
15 June 2010
 
» Humyo now owned by Trend Micro Anti Virus Click Info
Cloud technology is now a big hit....
14 June 2010
 
» Ubuntu versus Windows and the former wins
Ubuntu is now the leading product based on consumers' opinions....
14 June 2010
 
» World Cup malware rampages in the web says Symantec
The World Cup theme is now overused as criminals continue to use this in compromising many computer systems....
13 June 2010
 
» Eleven Chrome vulnerabilities now updated
Another upgrade were done by the web giant as a response to the concern over the security of users....
13 June 2010
 
» E-mail addresses divulged with breach on iPad's security
E-mail addresses were divulged but this occurred only with a small glitch....
12 June 2010
 
» Wi-Fi data gathering done with intention
Google rejected the idea that they gathered Wi-Fi with intentions but Privacy International thinks otherwise....
12 June 2010
 
» Botnet master lead the death of its own creation
The creator had no choice but used his last resort and he ended up destroying his latest masterpiece....
11 June 2010
 
» Exploit on XP carried out by Google employee
Protocol was bypassed when the Google engineer distributed the information about a Microsoft vulnerability before informing the company....
11 June 2010
 
» Amplified security as Twitter cuts URLs short
Twitter created a new method in order to protect their users and this works by shortening the URLs being posted....
10 June 2010
 
» Group of SMS scammers in Malaysia now arrested
Lottery scam is the common method used by vicious. Fortunately, the group that used this in Malaysia was recently caught by the police....
10 June 2010
 
» Doctor Who game bears an astonishing treat
Downloading game from P2P networks can actually bring danger....
09 June 2010
 
» Virtualized desktop now on Trend Micros hands
There should always be a room for technological advancements....
09 June 2010
 
» Bangladesh Facebook, rolling in the web again
Posting an offending photo will cause the ban of the social network in Bangladesh....
08 June 2010
 
» Serious glitch detected on Adobe products
New threat was found on the Adobe products but some things may be done in order to prevent larger problems....
08 June 2010
 
» New spam masquerades as Twitter-related mail
A spam message was found to have been circulating through webmails and this allows download of fake antivirus program....
07 June 2010
 
» Web giant focuses on security processes
It is the time for the web giant to prove the others wrong....
07 June 2010
 
» Additional installment in Twilight saga may intensify attacks
A new book from the "Twilight" series will be released but it comes with a catch....
06 June 2010
 
» Panda cloud security product goes commercial
Paying for a product will surely give more advantage....
06 June 2010
 
» Samsung Wave handed out with Trojans creeping around
The popular company Samsung failed in some ways when they accidentally distributed handsets wherein the microSD cards were infected with a Trojan....
05 June 2010
 
» Privacy endangered after a company was hacked
Greatest bidder takes all....
05 June 2010
 
» No punishment for the instigators of Mariposa botnet
Punishment for the Mariposa instigators is not yet clear even if there were evidences presented....
04 June 2010
 
» Security software found with tiny bugs
Even security programs can be have little vulnerability of its own....
04 June 2010
 
» Microsoft defended the security of Windows OS
Microsoft quickly made a come back just after the allegations made against Windows OS....
03 June 2010
 
» Facebook haunted by click-jacking worm once again
The popular social network experienced yet another round of click-jacking attack....
03 June 2010
 
» Quit Facebook Day equals big fail
The scheduled "Quit Facebook Day" turned out to be a big failure when not too many people deactivated their accounts....
02 June 2010
 
» Windows Mobile game infected with Trojan
The popular Windows Mobile game was found to have been infected with a Trojan and this infection continues to spread all throughout the web....
02 June 2010
 
» Scammers prepare for another World-Cup-based attack
Scammers are again using the FIFA World Cup in order to spread terror in the web once again....
01 June 2010
 
» Web giant plans to ditch Microsoft Corp.
Google is planning to replace Microsoft's Windows OS with another of either Linux or Mac....
01 June 2010
 
» Over 26,000 Facebook users prepared to retire today
Quit Facebook Day was scheduled today but the social network did not believe that a lot of people will be joining the movement....
31 May 2010
 
» 450,000 US dollar worth of money ripped off by five
Five men were found to have stolen quite an amount of money from a city and there was already a file charged against them....
31 May 2010
 
» Hundred-million-dollar scareware criminals charged
The three men who were found to be accountable for the 100-million-US dollar worth of scareware are now charged and punishments are already settled....
30 May 2010
 
» 1,000 cases of data breach recorded by ICO
About thousands of cases of data breach were recorded by ICO and the organization devised a plan in order to prevent further damages....
30 May 2010
 
» ICO exploited on the distribution of phony e-mails
Information Commissioner's Office was used in another set of e-mail scams in the web....
29 May 2010
 
» Twitter dominated by unknown Twitter attackers
The Twitter account of the large oil company was hacked while in the midst of criticism from the oil spillage in the Gulf....
29 May 2010
 
» Advancement of privacy systems called for by EU
EU asked the three big companies to provide a more advanced systems in user privacy....
28 May 2010
 
» United Kingdom-based employment websites assaulted
Many of the employment websites handled by Trinity Mirror Group experienced an incident of hacking. However, the group still has know idea of how it began....
28 May 2010
 
» Famous companies offer service at a weekend event
Different companies in the IT industry will join hands in order to find the perfect solutions to the web-related problems worldwide....
27 May 2010
 
» Expert infected its own gadget with a virus
Famous scientist conducted an in-depth study about the advantages and disadvantages of the RFID chips....
27 May 2010
 
» Intensified security for the smaller industries from Symantec
Small to medium-sized business groups are mostly the targets of online crooks nowadays. Hence, Symantec created a product that will protect their websites from danger....
26 May 2010
 
» Second man found guilty on DDoS attacks
Another individual was found guilty on a case of DDoS attack online....
26 May 2010
 
» Rent out a botnet in the market only pounds 5.99
Shutting down online applications of various groups become easier since there are cheap botnets available on the web....
25 May 2010
 
» New form of phishing attack is unveiled
Ensure safety by using one browser at a time. Too many browsers will lead one to danger....
25 May 2010
 
» Click-jacking worm scares Facebook users
A new type of worm was found and is currently frightening the users of the large social networking website, Faceboo....
24 May 2010
 
» Fake Facebook application fools more users
The Facebook users were tricked on Saturday by an application coated with an interesting video....
24 May 2010
 
» Unauthorized individuals erase Facebook friends with ease
Facebook is once again the center of complaints as friends in the contact lists of the users disappear without consent....
23 May 2010
 
» Twitter opposes any legal action against its users
Twitter said that it would not comply with the legal demand for revealing the identities of itwo of ts users as this will become a violation of an individual's rights....
23 May 2010
 
» Facebook conspires with advertisers against users
It was found out that the advertisers are communicating with the social network service Facebook in order to gather information about the users....
22 May 2010
 
» Infected USB drives distributed by IBM
IBM distributed malware-containing USB drives during a conference but the company quickly sent out e-mails of apology and instructions for system disinfection....
22 May 2010
 
» UKs ICO handed professional advice to Google
ICO suggests that Google deletes all its stored Wi-Fi data but other groups believe otherwise....
21 May 2010
 
» ISP supporting child pornography permanently disabled
After months of court trial, the ISP supporting child pornography finally received the verdict....
21 May 2010
 
» MySpace aims for the best security
MySpace wanted to set its image apart from the rival company and the administrator did just that by making big adjustments on their security system....
20 May 2010
 
» Facebook rushed to fix the newly-founded glitch
A week just passed and Facebook faces another challenge when the engineers of this social networking site found another security vulnerability....
20 May 2010
 
» Rise in the malware attacks stabilizes
Recent study shows that the rise in the number of malware attacks during the past months has been stabilized....
19 May 2010
 
» Distinctive user identifiers discovered in web browsers
It was discovered by the EFF experts that unique configurations must always be applied on web browsers to avoid the digital fingerprints left when viewing web pages....
19 May 2010
 
» DDoS attacks now instigated by servers
Attacks are now more intense as servers become the leading distributor of the DDoS....
13 May 2010
 
» Illegal construction of database spotted
Producing a large database using the newest infrastructure truly violated the rights of the citizens....
13 May 2010
 
» Google pledges full security on privacy
Google, even through several security complaints, managed to present to its users the promise for full protection....
12 May 2010
 
» Device that checks bugs in plug-ins from Mozilla
Mozilla improved its tool in order to extend help to the users of other web browsers....
12 May 2010
 
» Bug gives users permission to assign followers
Users abuse a bug once they gain knowledge of it....
11 May 2010
 
» New glitch spotted on Apple Safari
New glitch was found in the Safari browser for Apple operating system and this allows activation of code by abusive criminals....
11 May 2010
 
» FIFA spam spreads terror in the web once again
The theme of FIFA is used by the online criminals once again in order to spread large volume of spam mails....
10 May 2010
 
» Email 2.0 moves with the net towards the new age
The systems of the webmail must be upgraded in order to gain the trust of the online users today....
10 May 2010
 
» Lack of adequate knowledge leads to Linux abuse
Users who do not know how to handle their Linux computers will most likely become victims to malicious attacks by online criminals....
09 May 2010
 
» Latest breed of threat avoids the watchful protections
New methods were discovered by the software security experts and these allows entry into a system without being detected by the anti-virus programs....
09 May 2010
 
» ISP receives $2.6M as compensation for spam flood
There will be a corresponding amount of money as fine for every spam mails received by a winning plaintiff....
08 May 2010
 
» Fix for two security holes on Microsofts May update
Two new security holes will be fixed on Microsoft's scheduled update on May 11....
08 May 2010
 
» Widespread DOS, a caution from VeriSign
There are multiple reports about the rampan DDoS attacks and users are told about the necessary actions in order to protect their systems....
07 May 2010
 
» User privacy in Facebook endangered by the new bug
Facebook experienced a glitch on Wednesday but it was quickly fixed after the managers receive a report....
07 May 2010
 
» Facebook users pay no heed to security controls
Facebook users are the ones who put themselves in danger by not using what is already offered to them....
06 May 2010
 
» Online shop spamming about Viagra at Twitter
A Twitter account was constantly online during the past month and it was able to distribute links to drugs stores that sell Viagra and other medications that require prescription....
06 May 2010
 
» Developers act as online crooks through Google lessons
Google released another tutorial that allows ordinary developers to have an experience of how it is like to be a hacker....
05 May 2010
 
» Anti-spam tools went through a bout of function test
Different anti-spam tools underwent a test in order to check its capabilites and only a few did not pass the examination....
05 May 2010
 
» Unlock 3G in iPad with an all new jailbreak program
A new jailbreak application was developed and it allows turning an iPhone into 3G modem. According to Apple, however, this application may have negative results....
04 May 2010
 
» Cyber Security Challenge UK encounters slipups
Few days after the launch of Cyber Security Challenge UK, the website encountered security threats but it was instantly remedied....
04 May 2010
 
» Latest Opera patch for Microsoft and Apple ready for use
Opera browser patch now available for both the Windows and Apple users....
03 May 2010
 
» Online safety: major topic of government conference
A conference will be held on Tuesday and various influential guests will speak about how cybercrimes may be fought....
03 May 2010
 
» Cross-site scripting error discovered by Microsoft
A hole was found in the components of the SharePoint products. However, no evident attacks with the use of the vulnerability was heard of....
02 May 2010
 
» Case closed on the theft by an IT consultant
The IT consultant responsible for the theft in a bank received his 63 months of imprisonment on Wednesday....
02 May 2010
 
» Stronger European campaign for data protection advocated
Determination can never stand alone and a well-planned schemes must be worked on for stronger data protection....
01 May 2010
 
» Hacker of Sarah Palins webmail sentenced
David Kernell, the college student who accessed Palin's Yahoo! Mail account was already sentenced and he will serve 21 years in prison....
01 May 2010
 
» Study for cloud computing now with European Unions
Later in time, information security will really have to creat research on new topics that include cloud computing....
30 April 2010
 
» PDF files used for worm transportation on Windows
Online criminals create more active worms that are now endangering Windows-operated computers....
30 April 2010
 
» United Kingdom raced with the twelve spamming countries
Many spam mails are being distributed in various webmail accounts and most of them are from the Sopho's list of the 12 notorious countries....
29 April 2010
 
» Texas resident admits to botnet teaching
The mastermind in creating botnet software plead guilty on the case that was filed against him....
29 April 2010
 
» Phony anti-virus programs go berserk, Google reported
Phony anti-virus programs are spreading through the online community and many users already fell for the sweet traps....
28 April 2010
 
» Storm botnet, revived and now causing panic
Storm botnet died long ago and it is now running wild once again as it was revived....
28 April 2010
 
» Backdoor malwares are now aiming at the iPad owners
Backdoor malwares are on the loose as these target the owners of the newly-released iPad....
27 April 2010
 
» McAfee agrees to pay for their users' expenses
Computers of the McAfee users were damaged by their recent update and the company plans to pay back the amount of money spent....
27 April 2010
 
» Credit card details found to be distributed by Blippy
Blippy was found to have been distributing credit card details through search engines. However, the administration denied the fact and defended that this only happened during the beta test....
26 April 2010
 
» Week of events that gave impact to various sectors
Last week had been both good and bad for different sectors of the internet community. Most sectors, however, were plagued with the unwanted attacks from the vicious online hackers....
26 April 2010
 
» Security firms plan to educate against phishing attacks
A group of concerned people believes that it is the right time to teach the people about safeguarding their own credit card details....
25 April 2010
 
» MS placebo patch instantly recalled
Microsoft instantly recalled their latest update after learning that it has no use in fixing the vulnerability in their products....
25 April 2010
 
» Android OS manipulated to function on Apple iPhones
A developer discovered that an Android OS can actually function on an Apple iPhone handset since it was created with a dual-boot system....
24 April 2010
 
» Koobface unexpectedly appears upon shutdown HK
Battle against Koobface at Hong Kong was successful but it suddenly appeared at China just after a few weeks....
24 April 2010
 
» XP system collapses with new McAfee patches
Complaints were sent to McAfee regarding the collapse of XP systems after the latest update from the security firm. ...
23 April 2010
 
» Google Chrome security threats patched up
The threats that were found in the Windows-compatible Google Chrome browser were all patched up and now more convenient for the users....
23 April 2010
 
» Cross-channel authentication in UK, now available
A valuable tool has been released by RSA Security in order to assist many groups that are in need of security against widespread cases of scam....
22 April 2010
 
» In depth presentation of online attack methods by Akamai
Akamai wrote a report on the countries where large malicious attacks originate from. It was discovered that the attacks come from United States, Russia, and China....
22 April 2010
 
» Appearance of latest malware on Mac OS X unveiled
A new malware was discovered and is now causing trouble among the many users of Mac OS X. However, it was also found out that this malware is actually an advanced version of the one that plagued the w...
21 April 2010
 
» Undergraduates as new targets of UK-based fraudsters
Undergraduates and those who have loans in the Student Loans Company are the new targets of scams and frauds in UK....
21 April 2010
 
» BobBear takes permanent leave from battling fraud
The man who has been battling fraud and helping the casualties of these scams broadcasted that he already made a decision to completely leave his post....
20 April 2010
 
» Unalterable secret codes for Fring revealed
It was revealed that the account passwords in Fring is truly unalterable and that it causes low protection for the users of this application....
20 April 2010
 
» Five-year-sentence handed over the TJX co-conspirator
The co-conspirator of the TJX hacking received its punishment that is lighter than that of the mastermind's penalty....
19 April 2010
 
» Unsuccessful battle against spam by Google
Efforts were put to waste when it was found out that the amount of spam mails had only settled even after shutting down some of the prominent botnets....
19 April 2010
 
» Blackmail tactic to trap innocent users
Web users in Japan are being targeted with the use of a dirty tactic of posting confidential data on a website and demanding for a fee on a fake infringement of copyright....
18 April 2010
 
» MS update skips polluted systems
Microsoft's latest update contains a kernel code that avoids installation of the patch on an infected computer. This is the answer to the previous incident that scared various individuals....
18 April 2010
 
» Netbook anti-virus software now out in the market
Netbook users need not to worry now that a new anti-virus pack has been created in order to protect the systems of the handy PCs....
17 April 2010
 
» Abuse of Adobe Reader vulnerabilities captured
It was found out that several online crooks have already tried utilizing the security vulnerability of the Adobe Reader for the purpose of accessing computer systems....
17 April 2010
 
» Face-off, Yahoo against governments access to webmail
Yahoo and other agencies joined hands in order to fight the access of government into private webmail accounts....
16 April 2010
 
» iPhone unlock function faked into DNS Trojan
A new yet previously used tactic has be haunting the online community using the inviting idea of an iPhone unlock utility....
16 April 2010
 
» Microsoft distributed 25 remedy patches for its products
Microsoft distributed 11 bulletins through their monthly update in order to fix the vulnerabilities in their products....
15 April 2010
 
» Adobe and Oracle saved their products with latest up
Both companies Adobe and Oracle released updates so as to fix the vulnerabilities in their merchandises, which put computer systems at risk of online attacks by crooks....
15 April 2010
 
» Patient confidentiality with the info-scrubbing algorithm
A new device was created in order to improve the protection of patient's confidential data....
14 April 2010
 
» Heightened data protection being advocated by BSA
Business Software Alliance is campaigning for a collaboration of various entities in order to strengthen the protection of confidential information....
14 April 2010
 
» Chinese-based hacking attack unleashed
Online attacks were found to be connected to the authorities in the country of China....
07 April 2010
 
» Youth as Googles goal for the account safety crusade
Google created their latest security video in order to share some knowledge to the young online users regarding protection of their own accounts....
07 April 2010
 
» Innovative privacy page for Buzz to be released
Google created the confirmation page in order to deal with the problem regarding Buzz's security issues....
06 April 2010
 
» Vulnerability in PDF security creates tension
Security vulnerabilities were found on PDF thanks to the two separate studies done by two different security researchers....
06 April 2010
 
» Microsoft and Apple in its week of security adjustments
The previous week was an extraordinary week for many companies. Some had become successful in upgrading their products. However, there were some who encountered unlikable events....
05 April 2010
 
» ICO powers are now renewed and strengthened
ICO was previously underestimated by some firms as it was viewed as a powerless agency. However, new powers were bestowed upon it for a more successful implementation of data protection....
05 April 2010
 
» Forrester suggests for a heightened social media security
According to the analyst firm, Forrester, there should be an increase in protection within social media. There are various methods that can be used in order to accomplish this kind of task....
04 April 2010
 
» Serious glitches discovered in Java
Serious glitches were found in the two versions of Java but Oracle already has the fix for these....
04 April 2010
 
» Firefox 3.6.3 vulnerability patched up
The vulnerability of Firefox 3.6.3 found during the Pwn2Own contest is now resolved, according to Mozilla....
03 April 2010
 
» Security of IBM and Verizon already in the cloud
IBM and Verizon business joined hands in order to creat an efficient weapon that may be used when restoring and backing up data....
03 April 2010
 
» Journalists are now targets of the online crooks
Webmail accounts of journalists are the newly-discovered targets of unknown online criminals....
02 April 2010
 
» Blogs of Vietnamese protesters in the midst of danger
A new kind of trojan was discovered to be infecting downloadable keyboard drivers of the Vietnamese alphabet....
02 April 2010
 
» Google breached the promise of privacy protection
The web giant was flooded with complaints from the users of their latest feature, Buzz. The online users found a flaw in Google's privacy policy....
01 April 2010
 
» Hackers celebrate with every weak password they use
Symantec's recent study proved that many online users commit the most common mistakes with regards to the passwords that they use in their accounts....
01 April 2010
 
» Update for OS X released by Apple
Apple released an update for the Leopard and Snow Leopard operating systems, which will help in improving its performance and security....
31 March 2010
 
» Content filtering, available on DeviceLocks following update
A new version of Devicelock will be released in the market with the purpose of filtering contents being sento via the web....
31 March 2010
 
» Trojan replaces the authentic software updates
New methods of infecting computer systems were discovered and these include trojans masquerading as genuine updates from popular companies....
30 March 2010
 
» Emergency IE patch to be produced by Microsoft
Microsoft will release an out-of-band update in order to remedy the newly-found glitches in the Internet Explorer....
30 March 2010
 
» Social networking sites becomes accessible to kids
Based on the latest survey, there is an evidence that more children under the required registering age utilize social networking services such as Facebook and MySpace....
29 March 2010
 
» Malware finds another hiding spot in the tax documents
Malwares are now taking the form of tax documents in order to harm more computer systems....
29 March 2010
 
» Malware hiding in a PDF file hassles the web
A malware was discovered to have replaced the contents of a PDF file, which was originally a guide for the well-known football competition....
28 March 2010
 
» Close watch on net cafe customers empowered
The British police department suggests that owners of internet shops should watch their customers for any questionable move in accordance to the new plan against terrorism....
28 March 2010
 
» Instigator of TJX hacking sentenced with 20 years
The instigator of TJX hacking is now punished with 20 years of imprisonment and an amount of fine as a compensation....
27 March 2010
 
» Conference in Europe, officiated for the battle crim
CoE was held this week at Strasburg and the fight against cybercrime was the main concern of this event....
27 March 2010
 
» Google says a glitch caused the Chinese biography bug
Appearance of the biography of the Google executives was caused by a bug and not done by hackers....
26 March 2010
 
» No ill intentions says the Twitter hacker
The 23-year-old hacker of the popular micro-blogging service asserted that he had no ill intentions when he accessed the the computer system....
26 March 2010
 
» Google promises to protect users from malicious activities
Google introduces a new feature, which will protect users from spam and attackers online....
25 March 2010
 
» Latest version of Aviras antivirus, now available
Avira, the Germany-based manufacturer of security products, released the latest version of the AntiVir and download links are available in various download servers....
25 March 2010
 
» McAfee grants users the answer for data loss
McAfee produced a new product, which is aimed at protecting systems from the risks of data loss....
24 March 2010
 
» Symantec launches another security masterpiece
Symantec launches a new security product that is deemed to be helpful in fighting malware infections,...
24 March 2010
 
» False patch ruins different branches of computer systems
The latest update of BitDefender resulted to a damage in different applications because the system files were detected to have been infected with Trojan....
23 March 2010
 
» Google web scanner now available
Google produced another service, which helps in spotting vulnerabilities in different computer programs....
23 March 2010
 
» Street View controversy not yet concluded
Google faces another controversy due to an uploaded photo of a young female murder victim. This caused a flood of complaints at Google....
22 March 2010
 
» Update for Firefox 3.6 is now ready
The update for the security vulnerability of Firefox 3.6 is now available, according to a blog done by Mozilla...
22 March 2010
 
» Penalty charged against the Virgin Mobile spamming
Virgin Mobile was charged with fine due to the many complaints sent by their customers to ACMA....
21 March 2010
 
» Firefox remedy Mozillas month-end offering
Firefox assured its customers that their remedy patch will be released by the end of March this year....
21 March 2010
 
» Hundred cars on standstill due to hacking
Several cars manufactured by Texas Auto Center were disabled by an ex-employee. This incident caused quite an amount of trouble to the many automobile users....
20 March 2010
 
» Trojan takes Energizer into a tricky situation
The website of the leading producer of batteries, Energizer, was discovered to have been distributing an infected file for more than two weeks already. The company promises the users that they will fi...
20 March 2010
 
» IE 9 no longer compatible with XP
Microsoft announced that Internet Explorer 9 can no longer be supported by Windows XP....
19 March 2010
 
» One in every four UK students participates in hacking
According to the latest online survey, about one in every 4 youngsters in UK is participating in hacking activities....
19 March 2010
 
» Firefox version 3.0, about to reach its conclusion
Mozilla announced that they will stop the production and updates for the Firefox version 3.0....
18 March 2010
 
» Use of fake MySpace profiles to fight crooks
MySpace profiles are currently being used by federal agents as weapon against alleged individuals....
18 March 2010
 
» Hazardous Facebook application scares online users
A certain Facebook application, which is a fake profile-checker, has been plaguing the users recently....
17 March 2010
 
» Users notified against counterfeited payment card terminals
Great amount of loss was recorder due to the spread of the bogus credit card terminals in the machines of Hancock stores....
17 March 2010
 
» New security test tool for safer online surfing
Jericho Forum created, yet, another evaluation tool for the security products....
16 March 2010
 
» Net crime loss currently booming
As of the moment, there is a recorded increase in the financial loss due to cyber crimes....
16 March 2010
 
» Microsoft is rushing a remedy patch for vulnerability
Microsoft is now finalizing the patch in order to fix the lapses in IE 6 and 7....
15 March 2010
 
» China search engine to be eliminated according to Google
China-based search engine is just about to be shut down, according to Google....
15 March 2010
 
» Street View threatens privacy of individuals
Google Street View is viewed by many individuals as a threat to security....
14 March 2010
 
» Recommendation contest invades privacy
Netflix discontinued its recommendation contest due to privacy issues....
14 March 2010
 
» Google Chrome is up for new tricks
Google Chrome creates a new security feature with the latest version 4.1....
13 March 2010
 
» Sarah Palin, now ready for the witness stand
Sarah Palin, 2008 election candidate, is now ready to state her testimony about her hacked webmail account....
13 March 2010
 
» Guessing becomes as easy as 1-2-3
Reset passwords are easy to guess according to research....
12 March 2010
 
» New forged Windows update attacks computers
Windows updates are being faked once again to cheat online users....
12 March 2010
 
» Twitter creates new weapon against online thieves
Twitter upgraded its security to fight phishing attacks....
11 March 2010
 
» Security firms won against malware botnets
Security firms collaborated to fight malware botnets....
11 March 2010
 
» Bogus anti-virus threatens the online community
Anti-virus scams are currently widespread and now threatening the internet users worldwide....
10 March 2010
 
» Latest code-execution lurking around IE
Internet Explorer version 6 and 7 are susceptible to the recent malicious comands....
10 March 2010
 
» Updating made easy by Windows Patch Vulnerabilities
Windows makes updating softwares trouble-free for today's internet users....
09 March 2010
 
» Paypal halts Cryptome's operation
Cryptome's account is currently stopped by Paypal....
09 March 2010
 
» Facebook Victimized by Erotic Clickjacking Exploit
Just three days ago, the administrators of Facebook blocked a clickjacking bug that showed images of a barely dressed woman on the profile pages of unsuspecting users....
26 November 2009
 
» IE Zero-Day Bug Now Race Against Time
Hackers and security specialists alike are racing against each other to either exploit or patch the Internet Explorer zero-day vulnerability....
26 November 2009
 
» Hackers of Climate Change Research Site Leave Trail
The headline-making climate change hackers have left an obvious trail for IT security investigators to follow; however, is anyone bothering to follow it?...
25 November 2009
 
» Hacker Invaded Symantec Japan Site
Plaintext passwords were exposed from a hacked, Asia-based Symantec website care of a Blind SQL Injection cyber attack....
25 November 2009
 
» Microsoft Admits Zero-Day Vulnerability in IE 6 and 7
Microsoft confirms that Internet Explorer versions 6 and 7 both have zero-day bugs in them. As of now, they recommend users to turn off JavaScript....
25 November 2009
 
» Internet Explorer Takes a Knee from New Attack
Older versions of the system-integrated Internet Explorer have been turned into security liabilities thanks to a hacker attack code that specifically targets the notorious browser....
24 November 2009
 
» Customers Blamed for E-Retailer Marketing Scam
Ecommerce marketers that have been implicated in a marketing scam of sorts are blaming the customers for the entire debacle....
24 November 2009
 
» Ralsky Incarcerated for Four Years over Spam Fraud
The dubious career of the Spam Godfather is now sleeping with the fishes....
24 November 2009
 
» Cyber Attackers Instigate Enormous Climate Data Hack
The data, source code, and credentials of several secretive scientists from the Climate Research Unit of the University of East Anglia have been stolen by nefarious hacker hooligans....
23 November 2009
 
» Latest iPhone Worm Identified by ISP
The owners of jailbroken iPhones everywhere should beware, because a backdoor-installing, botnet-infecting mobile phone worm is now making its rounds in the wild....
23 November 2009
 
» Cloud Computing Advice, Dangers, and Perks
ENISA recently published a report that outlined the pros and cons of cloud computing as well as recommendations on how to better utilize this new technology....
23 November 2009
 
» The Anti-Cyber Crime Unit of the FBI
In a congressional hearing conducted this week, the FBI outlined how its anti-cyber crime taskforce will get the job done when it comes to IT security....
22 November 2009
 
» Latest Internet Explorer Vulnerability Exposed
The newest Internet Explorer 8 security hole is so dangerous that it can make safe sites unsafe....
22 November 2009
 
» Riskiest Threats to Federal Infrastructures and Systems
A new study by the Ponemon Institute recently concluded that the E-Government initiatives intended to modernize federal infrastructures are fraught with many perils....
22 November 2009
 
» India and Its Cyber Security Awareness
The biggest India-based security conference in the history of the nation opened its doors last Tuesday in order to talk about the depth of cyber security awareness in the country to date....
21 November 2009
 
» NSA Empowers Windows 7 Security
The National Security Agency has helped a lot in beefing up the IT security measures of Windows 7, and is now providing the same service to Red Hat, Sun Microsystems, and Apple....
21 November 2009
 
» Security Chief and Crypto Vanguard Leaves Sun system
The veteran Chief Security Officer of Sun Microsystems and renowned crypto pioneer Whitfield Diffie had already left the software giant....
21 November 2009
 
» Spammers Exploit Recent Swine Flu Trend
The online outlaws of Mother Russia are at it again as they distributed a spam scam that took advantage of the current swine flu panic-buying trend....
20 November 2009
 
» 2008 Campaign Allegedly Affected by Palin Email Hack
Former GOP vice-presidential candidate Sarah Palin claims that the hijacking of her Yahoo email account is the most troublesome issue she faced during her campaign trail in 2008....
20 November 2009
 
» SSL Renegotiation Vulnerability Exploit in Twitter
A Swiss researcher has just demonstrated how serious the Twitter SSL renegotiation vulnerability really is. ...
20 November 2009
 
» Career Opportunities and Hate Mail Engulf iPhone
The man who created the rickrolling iPhone worm is presently deluged with both death threats and job offers because of his little malware-based practical joke. ...
16 November 2009
 
» Report on Website Vulnerability Commonalities Released
The WhiteHat Security Report reveals that for the last three years or so, many urgent, critical, or high-level security issues continue to slowly increase over time....
15 November 2009
 
» Adobe Flash Policy Exposed to Online Dangers
The lackadaisical security measures of Adobe Flash can and will put UGC enthusiasts into a bit of a bind, so to speak....
15 November 2009
 
» Fed Wiretaps Susceptible to Exploits
Wiretapping can now be easily circumvented thanks to the thin bandwidth of such devices....
15 November 2009
 
» Microsoft Functionality Patent Stolen from Unix?
Critics are complaining about the latest Microsoft functionality patent because the feature appears too much like the ones used by the Unix platform....
14 November 2009
 
» Twitter API a Hiding Place for Exploit Websites
The Twitter API trends function has become a viable medium for hackers to conceal their dubious craft with....
14 November 2009
 
» Wikipedia Charged for Illegal Name Disclosure of Murderer
The Wikipedia article disclosing the name of the convict for the gruesome murder of a popular German actor has caused the perpetrator to sue the online encyclopedia....
14 November 2009
 
» The Cyber Warriors of Britain go into Battle Next Year
The online soldiers of the United Kingdom are moving onward to the cyber warfare front on March 10, 2010....
13 November 2009
 
» Remote Kernel Crasher Code for Windows 7 Published
The code that causes print and file freeze on computers has finally been disclosed and addressed by the Microsoft Corporation....
13 November 2009
 
» Complex Parcel Mule Scheme Exposed by RSA
The RSA has recently uncovered a Europe-based reshipping parcel mule scam that targeted U.S. citizens to work as freight-forwarding middlemen....
13 November 2009
 
» Daily Cyber Security Hazards Federal Agencies
The CDW Government released a report that outlined the standard cyber security threats that companies face on a daily basis....
12 November 2009
 
» Latest Apple Safari Patch Fixes Critical Security Holes
Apple has just issued several security patches for the Safari 4.0.4 web browser yesterday....
12 November 2009
 
» The Britney Spears Twitter Invaded Once More
Last time, hackers put in a misleading message on the Twitter of singer Britney Spears. They then decided than one hack deserved another, and oops, they did it again....
12 November 2009
 
» Spam King Lawsuit Won by Facebook
The spam lawsuit between the self-described Spam King Sanford Wallace and social networking giant Facebook had ended, with Facebook emerging as the victor. ...
30 October 2009
 
» More Microsoft Clean Up after Record-Breaking Patch
Microsoft has followed up its impressive release of security patches just half a month ago with even more virtual bug extermination....
30 October 2009
 
» Impending Hacker Armageddon Coming Soon
According to a report by James Lewis, the worst is yet to come for the cyber attack battlefield....
29 October 2009
 
» Microsoft Launches Free Vulnerability Mitigating Tool
Microsoft has released a free security tool designed to lock down applications that are vulnerable to hacker attacks....
29 October 2009
 
» Latest Firefox Corrects Serious Security Issues
The latest Firefox offering has finally addressed and fixed several critical security issues....
28 October 2009
 
» Gizmodo Apologizes for Malware Surprise
The staffers and authors of Gizmodo were too late in spotting the hack done to their site....
28 October 2009
 
» Rogue Trader Recommends More Intelligent Regulation
The Nick Leeson lesson for today is that better regulation will help a lot in avoiding financial disasters. ...
27 October 2009
 
» Pitiable Password Choice and Malware Remain Greatest
According to a recent study by PhoneFactor, poor passwords and malware plagues are presently ranked as the greatest security threats facing users today....
27 October 2009
 
» McKinnon Case Defense Tactics Criticized by Ex-FBI Officer
Ed Gibson, a former FBI officer, has heavily condemned the methods adopted by the defense team of hacker Gary McKinnon. ...
26 October 2009
 
» Windows Mobile Troubles Rising Amidst Stiffer Competition
Because of emerging rivals, the future of the Microsoft mobile OS could be very bleak....
26 October 2009
 
» Reinventing IT Security RSA Europe Conference
IT security is presently experiencing a bit of a renaissance and revolution nowadays thanks to trends like cloud computing and social computing....
25 October 2009
 
» Future IT Management Trends Security Network
The continuing evolution of IT management is changing technology in a fundamental level....
25 October 2009
 
» Ex-NASA Employee Arrested Selling Classified Informa
A top NASA scientist that assisted in the discovery of water on the moon has just been busted for leaking satellite intelligence to Israel....
24 October 2009
 
» Education Program from the Anti-Phishing Working Group
The APWG has announced on Tuesday the deployment of their education program against the ever-growing phishing problem....
24 October 2009
 
» The Identity Theft Survival Guide
The modern-day virtual criminal is a devious fellow that can outwit even the savviest of consumers because of his intricately done spoof sites that look just as legitimate as the real thing....
23 October 2009
 
» The Rogue Security Program Business Model
The online outlaws of the wild, wild worldwide web have been profiting handsomely from their pay-for-performance business scheme....
23 October 2009
 
» Data Collector Gets $275,000 Fine for Data Leak
One of the foremost collectors of client data has been mandated to pay $275,000 because it has unintentionally exposed the credentials of a multitude of consumers....
22 October 2009
 
» Hacker Scare Tactics Help Sell Rogue Security Programs
According to the results of the Symantec Rogue Security Software Report, cyber terrorists are using scare tactics to scam users into buying their faux security programs....
22 October 2009
 
» Social Media Use Banned by Movie Studios
Celebrities are currently being banned from using online social media like Twitter and Facebook by movie studio executives in order to avoid information leaks and the like....
21 October 2009
 
» RSA Recently Launched Comprehensive Consulting Servi
RSA is presently offering new advisory and consultative services to assist companies in enhancing or implementing their security system operations....
21 October 2009
 
» Software Vulnerability Hampers Brain Tumor Operation
A bug in the software of a radiation therapy device causes the system's emergency stop button to malfunction, which is why a patch had just been created for it last week....
20 October 2009
 
» Security Headaches Caused by Social Networks iPhone
The ever-growing popularity of social networks and iPhones has been troubling many a security administrator....
20 October 2009
 
» Data Standards for UK Call Centers Decidedly Lackadaisical
The negligence of UK call centers when it comes to purging financial account credentials recorded on phone conversations will potentially develop a dangerous reservoir of sensitive, actionable data....
19 October 2009
 
» Newest Cain & Abel Version Now Available
The latest version of Cain & Abel (a password-retrieving program that covers the services of multiple hacking applications into a single freeware tool) has just been released....
19 October 2009
 
» Trojan Steals $480,000 from Bank Account
Last Thursday, a notorious trojan pilfered about $480,000 from an online banking account of a Pennsylvania-based company....
18 October 2009
 
» Email of Passenger Rights Activist Allegedly Hacked
The email of an airline passenger rights chief had supposedly been hacked by Delta Airlines, which the travel company firmly denies....
18 October 2009
 
» Google Offers Compromised-Site Admins Malware Samples
Google has recently enhanced its existing service that offers webmasters of infected sites with malicious code samples and other important data to help with website recovery....
17 October 2009
 
» DDoS More Affordable Thanks to Botnets
According to several security researchers, cyber crime services are now cheaper than ever before....
17 October 2009
 
» Google Accused of Double Talk by Consumer Group
An L.A. consumer group alleges that Google is employing the double talk tactic to allay security concerns....
16 October 2009
 
» RAND Alleges Cyber Defense Better Than Offense
According to the RAND Corporation, the U.S. should focus on defense or prosecutorial, economic, and diplomatic action instead of offense or strategic cyber warfare against hackers....
16 October 2009
 
» Old Wal-Mart Cyber Attack Exposed
Back in 2005 and 2006, Wal-Mart became a victim of a major security breach wherein cyber terrorists siphoned their website source code and other critical information to an Eastern European computer....
15 October 2009
 
» Sophos Launches Endpoint Security and Data Protection 9
The recently released Endpoint Security and Data Protection 9 by Sophos was developed to overcome the principal problems in using DLP: manageability, cost, and complexity....
15 October 2009
 
» New Record in Flaw Fixes for Patch Tuesday
The Microsoft Patch Tuesday last October 13 was able to fix a record number of vulnerabilities in the different iterations of Windows OS and a multitude of programs....
14 October 2009
 
» Trend Micro Threat Management Services Coming Soon
Trend Micro has just announced the upcoming implementation of Threat Management Services that will expose Internet dangers and feature a remediation, containment, and proactive warning system....
14 October 2009
 
» Green Dam Showing Cracks China Censorship
The China-based Green Dam-Youth Escort censorship program is facing hurdles as targeted institutions are not installing (or are even uninstalling) the software because of its bug-filled nature....
13 October 2009
 
» Old Pedophile Secretly Videotapes Teenagers Internet
A man in his forties posed as a seventeen-year-old teenager so that he could trick girls into performing sexual acts on camera via video chat rooms....
13 October 2009
 
» ID Fraud Prevention Week Has Commenced
The National Identity Fraud Prevention Week started off with a bang in the United Kingdom on Monday....
12 October 2009
 
» EU Plotting Spam Clampdown via Telecom Reform
The European Commission is presently requesting for stricter restrictions and sanctions against spammers in order to protect user privacy....
12 October 2009
 
» Man Partly Responsible for PayPal Hacker Certificat
The account of a white-hat hacker was suspended by PayPal on Tuesday after his research was used by another hacker to publish a counterfeit SSL certificate for the payment service....
11 October 2009
 
» Sophisticated, Revenue-Stealing Botnet Discovered
A botnet that siphons actual advertisement profits from major sites like Bing, Yahoo, and Google had just been discovered, and it is currently distributing its stolen revenue into smaller networks....
11 October 2009
 
» America Must Now Concentrate on Critical Network Security
The United States must now focus their attention on protecting their most crucial online networks against the ever-growing perils of cyber assaults and hacker attacks....
11 October 2009
 
» Wife of FBI Chief Bans Him from Online Banking
One of the most powerful men in American intelligence and cyber crime investigation is currently undergoing domestic surveillance....
10 October 2009
 
» Common Passwords Still Exposed to Hacker Attacks
The Hotmail phishing attack showed that password security is still woefully ill-prepared against the simplest of hacks....
10 October 2009
 
» The Latest Phishing Operation is Small Potatoes
The black market is currently inundated with webmail logins, so the price for that information is surprisingly low. ...
10 October 2009
 
» The Sybase Adaptive Server Enterprise Benchmark
A security benchmark has been created for the Sybase Adaptive Server Enterprise this week....
09 October 2009
 
» UFO Hacker Suffers Legal Setback
Gary McKinnon, who is also known as the UFO Hacker, is fighting a losing battle against his extradition to the United States....
09 October 2009
 
» A Hundred Scammers Indicted on Global Phishing Case
Although it took the better part of two years and the cooperation of Egyptian authorities, the FBI has finally charged a hundred people of phishing-related cyber crimes....
09 October 2009
 
» Online Outlaws Playing Hide and Seek with Prosecutors
Cyber criminals behind Internet banking trojans have begun to create fake trails to trick authorities....
08 October 2009
 
» Major Email Providers Suffer from Phishing Scam
Do not be victimized by email phishing scams; keep on reading and find out what to do when such situations arise....
08 October 2009
 
» Internet Banking Scam Upturn Trumps Plastic Fraud
According to the figures that the UK banking industry published last Tuesday, Internet banking scams caused 39 million pounds worth of losses in early 2009. ...
08 October 2009
 
» Better Spyware Education Presently Needed by Businesses
A Trend Micro study recently showed that companies are currently demanding more information regarding spyware prevention and security....
15 July 2009
 
» Guide to Scams, Hacks, and Other Online Terrors
Because Internet hoaxes have become more complicated and dangerous, Network Box has created a special guide that shows users how to be more vigilant against hoaxes, cyber attacks, and other Internet h...
14 July 2009
 
» Wyse Thin Client Device Susceptible to Exploit Vulns
A famous slimmed-down client gadget used by Fortune 100 companies, military contractors, and nuclear labs has been discovered to be weak against exploits, which puts whole multitudes of the appliances...
13 July 2009
 
» Lack of Security Measures Threatens NHS Hospitals
According to More4 News, NHS hospitals are presently suffering from massive infection and infestation problems caused by a particularly insidious malware epidemic....
12 July 2009
 
» Two Guides to Building a Cyber Security Business Case
Because of the ever-worsening state of affairs of worldwide cyber security, building a business case and developing a topnotch patch management process has become a very essential networking solution....
11 July 2009
 
» Lawmaker Calls for Action for North Korean Cyber Attacks
On Thursday, a principal Republican lawmaker advised President Barack Obama to create a retaliatory cyber attack against North Korea....
10 July 2009
 
» TJX Hacker Gets Rich While His Coder Rots in Jail
TJX hacker mastermind Albert Gonzalez was the person who profited the most out of his illegal credit card theft cartel, which left his coder, Stephen Watt, broke and presently facing prison time....
09 July 2009
 
» Clinton Email Caught by NSA Secret Database
According to a recent New York Times article, the personal correspondence of former American President Bill Clinton has been captured by an extensive database of intercepted domestic and foreign email...
08 July 2009
 
» Defend Against SSL Tunnel Hacks with UTM Firewall
Recently, Firewall launched the UTM hardware: a device with the innovative feature of examining encrypted Internet traffic within the SSL tunnel....
07 July 2009
 
» Chinese Firm Vehemently Denies Cyberspy Accusations
Huawei, a networking company based in China, denies accusations that it's conspiring with the Chinese government to run cyberspy operations within worldwide communication networks....
06 July 2009
 
» How Exposed Are You To Identity Fraud?
Seeing that there a lot of people who are worried about identity theft, identity fraud, account rackets, phishing expeditions, Trojan swindling schemes, and many other related cyber scams, it's time t...
12 June 2009
 
» Study Shows Employees Bypass Network Security
New research conducted by the Ponemon Institute reveals a severe lack of enforcement and awareness of security regulations within companies nowadays....
12 June 2009
 
» VSE 8.7i Patch Failure Downplayed by McAfee
About a week ago, a McAfee service pack did more harm than good to several computer systems by making them outright unbootable once it's installed. The support forum of the company is now trying its b...
11 June 2009
 
» Hacker Challenge Proves StrongWebmail Wrong
StrongWebmail has finally conceded that a group of non-criminal hackers has defeated its security system challenge and won a total of $10,000. ...
11 June 2009
 
» Crypto Attack Finds Chinks in Algorithm's Armor
Cryptographers from Sydney, Australia have found a way to break the SHA-1 digital-signature algorithm....
11 June 2009
 
» Breaking News: Twittering Could Get You Burglarized
An overenthusiastic Twitter user tweeted about going out of town, which may or may not have led to his residence getting burglarized....
10 June 2009
 
» Apple IT Security in Dire Straits
A renowned security expert claims that Apple is currently struggling to sufficiently protect its customers from malware, phishing, and other hacker shenanigans....
10 June 2009
 
» ISP Denies Passwords Cause of Disastrous Hack
A web host director adamantly maintains that the hack that wiped out data for more than 100,000 web pages was not caused by poor server configurations and password management. ...
10 June 2009
 
» Latest DoS Attacks Endanger Mobile Data Networks
Last week, a senior telecoms security researcher cautioned that a new and evolved type of Denial of Service attack is currently threatening the safety of worldwide mobile data network security....
09 June 2009
 
» Hacking Scam Yield Hacker $112,000 Total Earnings
A hacker from Hampton, New Hampshire was convicted of fraud charges for his scam to use trojans to empty the brokerage accounts on his targets' PCs....
09 June 2009
 
» China Mandates PCs to have Web Filter
China is planning to expand its stiff web filter policy by requiring all personal computers sold to it to have software that blocks entry into certain web portals by July 1 of this year....
09 June 2009
 
» The Safeness of Internet Voting
Last year, Arizona became one of the pioneers of using the Internet to accept and tally electoral votes online. However, it does beg the question of whether or not that's a good idea. ...
08 June 2009
 
» Hackers Breach UK Communist Site
Long story short, the official webpage of the Communist Party of Britain has been breached by either Chinese or Russian hackers and infected with malware....
08 June 2009
 
» Twitter's Trending Topics Exploited By Enterprising Hackers
Hackers are currently taking advantage of yet another popular Twitter trend and using it to spread malicious links and other forms of cyber attacks....
08 June 2009
 
» Is the Nationwide Cyber Security Threat Overstated?
Is hacking really the newest terrorist threat to hit the United States, or is the government merely blowing the issue out of proportion in order to get their budgets approved and authority expanded?...
07 June 2009
 
» Sears Settles in Regards to Spyware Charges
Sears, one of the biggest American retailers on the planet, has agreed to settle the lawsuit submitted by federal authorities claiming that the company slipped spyware from ComScore onto its customers...
07 June 2009
 
» Homeland Security Advisory Council Has Hacker Member
Jeff Moss, the organizer and founder of the Defcon and Black Hat hacker and security conferences, was among the sixteen recruits that joined the Homeland Security Advisory Council on Friday....
07 June 2009
 
» Mega Patch Gift from Microsoft Next Week
On Thursday, Microsoft announced that it will send over ten security patches, fixes, and updates to repair serious vulnerabilities found within Microsoft propriety software by next week's time....
06 June 2009
 
» Halifax Scores Victory with PIN Security Case
The "phantom withdrawal" verdict favoring the UK retailing bank Halifax could possibly go straight to the court of appeals....
06 June 2009
 
» Bing Gets an Extra Pornography Filter
Microsoft has included an additional pornography filter to its Bing search engine in order to block persistent pornographic content from slipping via the Smart Motion Previews service....
06 June 2009
 
» Gamer Hacks Bank Balance of Spymaster Game
An irritating micro-blogging game has been hacked through a funding exploit that eventually led to a wealth redistribution spree of in-game cash....
05 June 2009
 
» Online Safety Reassured with Harmful ISP Shutdown
The FTC (Federal Trade Commission) announced yesterday that it had Pricewert shutdown with the help of a San Jose district court. ...
05 June 2009
 
» Air France Flight Domain Name Registration Controversy
As investigators continue to determine the reason behind Air France flight 447's untimely crash and disappearance, a lot of speculation has arisen from a domain name registered two years before the ca...
05 June 2009
 
» Cyber Security Staff Appointed by DHS
Janet Napolitano, the U.S. Homeland Security Secretary, has appointed Philip Reitinger as the Director of the NCSC (National Cyber Security Center), supplanting predecessor Rod Beckstrom after he quit...
04 June 2009
 
» Security for Internet's Root Zone Finally Implemented
On Wednesday, the U.S. government revealed plans to digitally sign the Internet's root zone by the end of 2009....
04 June 2009
 
» Trojans Nestled into ATMs from Eastern Europe
Security specialists have uncovered a whole group of information-thieving trojans nestling themselves into ATMs across Eastern Europe for over a year and a half....
04 June 2009
 
» Hackers Attack 40,000 Sites Overall
A piece of malicious code found in modified websites has so far been very successful in hacking over 40,000 websites globally. ...
03 June 2009
 
» Feds Question Ex-Worker about Power Plant Breach
The Federal Bureau of Investigation (FBI) is investigating about a computer breach at a sizeable Texas power corporation that cost them over $26,000 worth of damages after the attack handicapped the f...
03 June 2009
 
» Data Breach Lawsuit Aimed at Security Auditor
More than four years after the CardSystems Solutions Hack of 2004, the auditor of the company...
03 June 2009
 
» Infestation of Security Bugs Invade British Websites
This week was filled with reports of high-status Internet bugs and glitches, with discoveries of pointless vulnerabilities on the sites of three British corporations....
02 June 2009
 
» Microsoft Offers DirectX Hole Patch
Microsoft is now offering an easier way to create a workaround for the latest vulnerability in DirectX....
02 June 2009
 
» MP's Facebook Has Been Hack Attacked
A member of the United Kingdom's parliament confirmed that his Facebook account was breached and hijacked by hackers....
02 June 2009
 
» McAfee Report on SEO Exploit Released
Lately, scammers with great SEO (search engine optimization) talents are using search engines to make Internet surfers download malware. As such, McAfee has published a report to help users protect th...
01 June 2009
 
» Obama Admits Government Unprepared For Cyber Terrori
Last Friday, President Obama addressed that the U.S. government was not as prepared as it should have been in responding to the recent bouts of cyber terrorism plaguing the country....
01 June 2009
 
» Reaction to Obama's Cyber Security Speech Optimistic
President Obama's cyber security speech on Friday has left the cyber security industry abuzz about who the new "cyber czar" will be....
01 June 2009
 
» Online Viral Outbreak Costs Google Ad Profits
A security researcher has warned that a virus-like web compromise has been making unsuspecting web surfers become part of a malicious botnet that forces Google search results to redirect to malware de...
31 May 2009
 
» Best Video Twitter Worm Spreading Rapidly
Twitter users beware! Clicking on the link "http://juste.ru" found in a repeatedly spammed tweet will result in your account getting infected and compromised by a dreaded and widespread web worm....
31 May 2009
 
» Nokia 1100 Can Be Used For Hacking Banks
According to a fraud investigation company, the urban legend about the Nokia 1100 mobile phone's capability to hack into bank transfers is very much true....
31 May 2009
 
» Angry Hackers Attack Rootkit Web Pages
You won't like hackers when they're angry. This was what two well-known rootkit webmasters found out after they were DDoS attacked to nigh-oblivion by an irritated hacker faction....
30 May 2009
 
» Teenage Hackers for Hire by the Pentagon
In what sounds like an ill-thought plot for a made-for-TV special in the Sci-Fi Channel, the military is currently looking for teenage tech geeks to help them with the cyberspace race....
30 May 2009
 
» PC Super Plague Claimed 30,000 Victims
A dangerous system infection that attempts to install a Molotov cocktail of insidious malware into your PC has already plagued up to 30,000 websites maintained by government agencies, business, and ot...
30 May 2009
 
» Obama Focused On Better Cyber Security Plan
Intelligence and military executives insist that something must be done about the state of cyber security in the U.S., so President Obama opted to create the cyber coordinator post....
29 May 2009
 
» Keystroke Logging Technology Race Rages On
Despite the fact that hackers are continuously filling their arsenal with brand new toys and accessories, cyber security experts are determined to stay one step ahead by developing innovations of thei...
29 May 2009
 
» Move Over, Conficker! Gumblar is Here!
Gumblar is staking its claim as the new most dangerous malware threat to hit the Internet while Conficker moves out of the public consciousness....
29 May 2009
 
» Hackers Harboring Anti-American Sentiment Breach Mil
Investigators are currently subpoenaing records from Yahoo, Microsoft, and Google for an ongoing probe of an anti-U.S. hacker group's infiltration of military servers. ...
28 May 2009
 
» China Insists to U.S. They Aren't Hackers
A celebrated Chinese Internet scientist asserted yesterday that there is no way that hackers from China or anywhere else can breach the firewalls of government or military networks to access classifie...
28 May 2009
 
» How Secure Is Your Data While Traveling?
Wireless Internet connection is everywhere nowadays. However, travelers must be wary of hackers using Wi-Fi connections in order to extract your private, personal identification, business, and financi...
28 May 2009
 
» Obama Set to Create Cyber Coordinator Position
President Obama braces himself in announcing the newly created post of "cyber coordinator"....
28 May 2009
 
» Controversial Australian-Wide Firewall May Not be
On December 2008, hundreds of Australians rallied against their government's proposal to filter and monitor all Internet content in Australia. Because of that, the government is now saying that the co...
27 May 2009
 
» Hazardous Microsoft DirectX Bug Presently Being Exploited
The dangerous DirectX vulnerability that Microsoft confirmed recently is now being exploited by hackers. ...
27 May 2009
 
» Will Secunia's PSI Guarantee Secure Web Surfing?
Secunia's PSI (Personal Software Inspector) is a comprehensive application that not only inspects installed programs for online updates ...
27 May 2009
 
» Romanian Immigrant Punished for Online Fraud
A Romanian immigrant that currently resides in Michigan was sentenced to eight years and six months for swindling 7,000 individuals via his phishing expeditions....
27 May 2009
 
» Webcam Users Guide against Hackers
Because of many a user's persistent and erroneous beliefs about webcam hacking, this article has been written to clarify several issues about the oft-underestimated phenomenon....
26 May 2009
 
» Symantec-Murdered Password Tool Resurrected
The seminal password tool named L0phtcrack returns long after Symantec halted further development of the application....
26 May 2009
 
» Firefox Extensions that Protect You While Surfing
Because browsers have become the target of choice for many a cyber criminal, being secure while you surf has become increasingly important. On that note, security extensions from Firefox will do just ...
26 May 2009
 
» Video of Hacker Terrorism: Hoax or Truth?
Is the Internet video of hackers playing Space Invaders with the lighting controls of a skyscraper an indication of a cyber terrorist apocalypse or just a simple web hoax? The answer will probably not...
26 May 2009
 
» Man-in-the-Middle Attacks More Complicated Than Prev
An SSL expert warns that there's more to man-in-the-middle attacks than users think. To be more specific, browser problems and other factors are responsible in making this hacking method so effective ...
25 May 2009
 
» E-mail Now Composed Of 90 Percent Spam
This isn't really news to many people, but official reports by Symantec now state what everybody else already knows: 90.4% of your email is composed of spam....
25 May 2009
 
» Facebook User's Virus Lawsuit Has Been Dropped
On Tuesday, a Florida librarian and activist recently dropped his civil lawsuit against Facebook for failing to protect users against virus threats....
25 May 2009
 
» Twitter API Serves As Web Worm Bait
A security researcher has cautioned that a Twitter API is currently being exploited by hackers to spread worms all over the social network....
25 May 2009
 
» Infiltrated Flight Simulator Community Site Still Offline
Three weeks ago, a popular site that has served as a central hub for flight simulator fanatics for 13 years was suddenly and utterly annihilated by hackers. ...
24 May 2009
 
» Offline Update 6.0: Update without the Internet!
With Offline Update 6.0, your fresh Windows and Linux installations can be updated without the need to head towards the Internet and risk hacks and worms in the middle of getting patches....
24 May 2009
 
» Worldwide Cyber Security Measures Needed says ITU
In a conference in Geneva, the International Telecommunication Union (ITU) has proposed for the harmonization of worldwide cyber security legislation....
24 May 2009
 
» The Most Harmful Facebook Spam Ever
Right this instant, hackers of pilfered Facebook accounts are spreading a harmful virus spam....
24 May 2009
 
» Palin Hacker Claims Pilfered E-mails Public Record
The Sarah Palin hacking case took a strange turn when the defense made a surprise legal maneuver where they claimed that her stolen e-mails were public record....
23 May 2009
 
» The Three Most Infamous Hackers
Here's a look back at the most infamous hackers the world has ever seen who have set the bar for future online outlaws....
23 May 2009
 
» Reviewing 2008's Most Critical DNS Security Hole
Last year's demonstration of an MDS design flaw via the easy creation of fake CAs using a collection of Sony propriety game consoles served as an important event in the world of Information Technology...
23 May 2009
 
» Is Cyber Warfare Becoming Real Warfare?
As we speak, the neutral zone between cyber attacks on communication networks and good old-fashioned war that's waged with swords, guns, and bombs is narrowing spectacularly....
23 May 2009
 
» Bug for Cisco's TFTP Server Patched
A recently exposed vulnerability found in CiscoWorks TFTP Server permits hackers to gain unauthorized access to system files. As such, Cisco released a fix for this particular bug. ...
22 May 2009
 
» U.S. Military Now Has Special Hack-by-Numbers Device
Gadgets that control cyber attacks are currently being tested and developed by the U.S. military and Internet security agencies in preparation for a virtual war....
22 May 2009
 
» Mystery Virus Baffles U.S. Marshals and FBI
An unknown virus has supposedly interrupted the webmail services of the U.S. Federal Bureau of Investigation (FBI), and it may be the same virus that attacked the U.S. Marshal's computer systems....
22 May 2009
 
» Clickjacking Design Flaw Possible Target of Hackers
A clickjacking prank exploiting a design flaw of the Internet leaves people afraid of the implications of this new vulnerability....
22 May 2009
 
» Die Hard with a Vengeance: Conficker Lives On
Although media coverage of the Conficker superworm has ebbed in recent days, several variants of the malware are still infecting about 50,000 new machines every day....
21 May 2009
 
» Adobe Releasing Security Upgrades Every Three Months
Adobe's Director of Product Security and Privacy recently wrote a blog post announcing Adobe's quarterly release of security upgrades that coincide with Microsoft's Patch Tuesday....
21 May 2009
 
» Password Reminders Are Also Exploitable Security Holes
Password reminders are useful to people who tend to forget the password they used on a recently opened or long abandoned account. However, they also prove to be vulnerabilities that hackers can use to...
21 May 2009
 
» Online Outlaws: Russia's Cyber Terrorists
Cyber terrorism and cyber crime has been on the rise worldwide as of late, and hackers from Russia have proven themselves to be among the most dangerous hackers out there....
21 May 2009
 
» Microsoft's Tool for Secure Software Development Released
As part of the SDL (Security Development Lifecycle), Microsoft has created a tool that allows developers to incorporate the information stockpiled through SDL into their software development environme...
20 May 2009
 
» Update on Unfixed Vulnerability of Mac
Here's an update concerning the six-month old vulnerability found on Apple's Mac platform....
20 May 2009
 
» Cyber Security Groups Up Against Malware Menace
A trio of cyber security groups announced yesterday their plan to team up and fight against the growing threat of malware....
20 May 2009
 
» University Server Breach not By IIS Vulnerability
Hackers have reportedly targeted Microsoft's Internet Information Services (IIS) web server, according to the administrators of Ball State University. However, the report turned out to be a false alar...
20 May 2009
 
» Google Confesses Chrome Vulnerability during Hacker
Chrome may have won against other browsers in the Pwn2Own hacker contest, but Google still admits that its browser had the same vulnerability that all the other browsers had at the time of the event....
19 May 2009
 
» NTPD Service Suffers From Buffer Overflow
The Network Time Protocol's open source implementation or NTPD is vulnerable to buffer overflows, which could allow attackers to remotely compromise or even crash a system....
19 May 2009
 
» Microsoft Confirms Server Vulnerability Reports
Microsoft recently confirmed last week's reports of a vulnerability in the Internet Information Server (IIS)....
19 May 2009
 
» Negligent Apple Ignores Critical Java Vulnerability
Even after Sun Microsystems warned about the Java virtual machine's vulnerability six months ago, the hole remains unpatched on Apple's Mac platform....
19 May 2009
 
» MPAA Wages War against RealNetworks
RealNetworks may soon become the latest legal conquest of the Motion Picture Association of America (MPAA) and its unending quest to protect the entertainment industry's copyrights and intellectual pr...
18 May 2009
 
» Facebook Becomes More Open with OpenID Support
Working in tandem with OpenID, Facebook now supports the OpenID login standard....
18 May 2009
 
» Dell Believes Windows 7 Too Expensive
A Dell representative states that Windows 7's current price could prove to be the barrier that keeps it from being adopted by users despite the fact that every other aspect of the operating system is ...
17 May 2009
 
» Controversial ContactPoint Goes Live Amidst Security Fears
The United Kingdom's government has announced their campaign to launch a controversial child protection database amidst worries of it not being secure enough against potential data leakage....
17 May 2009
 
» The BillMyParents Service Does Just That
The BillMyParents payment system will allow children to spend their parent's money online provided that the parents agree to buy them what they want....
17 May 2009
 
» Canonical's Ubuntu Enters New Frontier
Canonical has recently started beta-testing Ubuntu One, a file-synchronization service, for its Ubuntu Linux desktop operating system. ...
16 May 2009
 
» Wolfram Alpha Debuts with Glitches and Jeers
This Friday, the new Wolfram Alpha search engine's official unveiling was marred by terrible weather conditions on the site of their supposed launch and numerous networking glitches....
16 May 2009
 
» Mozilla's Post-Tab Era Cometh best Firefox Browser
Even as Internet Explorer belatedly adopts the tab-based services of their browser competitor, Firefox, yet another technological shift may leave Microsoft in the dust once more....
16 May 2009
 
» Open Database Alliance to Keep MySQL Alive
Michael Widenius is currently supporting MySQL by forming the Open Database Alliance (ODA), a consortium that should help keep MySQL at the cutting-edge of open source database development....
15 May 2009
 
» IE's JavaScript Focus May Be Its Undoing
Microsoft's concentration on improving how Internet Explorer (IE) handles certain features of JavaScript may have caused it to be left behind by its web browser competitors in the dust....
15 May 2009
 
» The Graphics Memory Industry Now Has Micron
Micron has recently entered into the DRAM chips market after landing third in worldwide sales of Dynamic Random Access Memory (DRAM)....
15 May 2009
 
» Craiglist's Erotic Services Section Gets the Boot
Craiglist has finally surrendered to the demands and requests of police officers from all over the country, resolving to shut down its "erotic services" ads. ...
14 May 2009
 
» Has Google's Top-Secret Cash-Making Machine Been Exp
Hitwise has uncovered that Google's paid ad clicks has taken a massive drop during the past month. Could it be that Google's clandestine money-making scheme has been exposed as ineffective? ...
14 May 2009
 
» Gmail Feature Encourages Users to Switch
Gmail now has a feature that helps migrate contacts and email from other email providers, which includes AOL, Hotmail, Yahoo, and a few other services. ...
14 May 2009
 
» New Visa card technology helps prevent fraud!
Visa introduces new technology to help prevent credit card fraud....
13 May 2009
 
» Are Wireless Networks in Finance Districts Insecure?
Air Tight Network's study shows that wireless networks in finance districts are relatively insecure....
13 May 2009
 
» D-Link Improves Routers Captcha style
D-Link improves routers and fights malware by using Captcha code....
13 May 2009
 
» The Importance of First-Party Video Games
First-party video games in the vein of Nintendo's Super Mario Brothers and Sega's Sonic the Hedgehog are very important in the continued evolution of video gaming....
12 May 2009
 
» Doro PhoneEasy 338gsm Goes Back to Basics
Doro, a Swedish company that released its first line of easy-to-use mobile phones two years ago, caters to a very specific and sometimes neglected target market. ...
12 May 2009
 
» What is the Point of Microsoft Research?
Microsoft Research's byline of helping develop new innovations to give corporations a competitive edge through fundamental research doesn't necessarily apply to the software giant....
12 May 2009
 
» E-commerce Lacks Consumer Trust
Marketers using the Internet to sell their goods find it difficult to earn consumer trust because of the ongoing threats of spyware, spam, phishing, and identity theft....
11 May 2009
 
» Bickering and Internet Drama Ensues Within Firefox
Last week, alarms were raised in the Firefox community after the developers of two popular Firefox extensions started duking it out over a disagreement that's been brewing underground for a long time....
11 May 2009
 
» Shorter Meetings Software Patented IBM Brainchild
IBM has filed a patent for an application that intends to address the "arbitrary hour-based scheduling paradigm", which should hopefully lead to employers having "shorter meetings" in the future....
11 May 2009
 
» WSJ Insists on Micro-Payments Model
According to a report in the Financial Times, the Wall Street Journal has begun plans to charge non-subscribers micro-payments for access to individual articles online. ...
10 May 2009
 
» Sun Shareholder Lawsuits Undermine Oracle Takeover
Sun shareholders are filing three class action lawsuits against software giant Oracle in an effort to stop the $7.4 billion acquisition deal....
10 May 2009
 
» GPS Ruling Shakes Up Privacy Activists
An appeals court in Wisconsin has just approved local authorities to use GPS tracking devices on anyone they deem fit without the need for a search warrant....
10 May 2009
 
» Google Plans to Start Twittering At Last
Is Google a little slow on the technological uptake or is it now hitching the Twitter bandwagon? ...
10 May 2009
 
» Ofcom Discovers Reason of UK Wi-Fi Failure
Ofcom has commissioned a report investigating Wi-Fi performance in the United Kingdom. It concludes that TV senders, baby listeners, and the "Free Public Wi-Fi" virus are the ones interfering with the...
10 May 2009
 
» iPhone Inside: Specs and Silicon Secrets
Apple considers the iPhone's inner workings a trade secret that users don't need to know, but should it be kept a secret?...
10 May 2009
 
» Microsoft Ad Targets Apple's Artist Audience
Does Microsoft even know how to appeal to a demographic normally associated with Apple? ...
09 May 2009
 
» Facebook Adds Refresh Alerts to Homepage Stream
Facebook adds a helpful new refresh alert feature in their equally new, stream-focused homepage to better acclimate its users to its recent changes....
09 May 2009
 
» Happy Birthday, Planar Integrated Circuit!
On Friday, May 8, the Computer History Museum celebrated the creation of the integrated circuit, one of the most important inventions of the modern era. ...
09 May 2009
 
» Sun May Have Broken Some Bribery Laws
Sun discloses that they may have committed some mistakes and violations concerning U.S. laws designed to prevent bribery in foreign countries....
08 May 2009
 
» U.S. Air Traffic Control Systems Breached
According to a recent government report, hackers were able to penetrate and partially shutdown an air-traffic data system in Alaska partly because of the modernization efforts of the FAA....
08 May 2009
 
» Google Chrome Launches Own TV Ads
The Google Chrome TV ads will soon be shown across conventional American TV after their initial success with the Japanese market and the Internet. ...
08 May 2009
 
» Multinational Companies Whine about Project Canvas
Consumer electronics corporations are complaining over the alleged negative impact Project Canvas will bring about to the United Kingdom once it is finally implemented. ...
08 May 2009
 
» Vulnerabilities in Gmail Mail System Gfails Again
Access to Gmail has been denied to many users of the ever-popular electronic mailing service this Friday, which is reminiscent of a similar outage just a few months ago. ...
08 May 2009
 
» Worm for Mac is a funny, little joke
A worm for Mac made in Tunisia is more successful in making us laugh than panic....
07 May 2009
 
» European Union Parliament supports Internet freedom
The EP has voted in favor of Internet freedom, but the Council remains opposed to the idea....
07 May 2009
 
» North Korea strengthening its online warfare?
North Korea is reported to have ordered 100 hackers for its global, online, offensive mission....
07 May 2009
 
» Data centre of IBM Warwick fails
Data centre of IBM Warwick failed due to a power outage last Thursday....
06 May 2009
 
» Windows 7 still cannot handle popular hack
How do Windows 7 retains Windows NT and others' vulnerability....
06 May 2009
 
» US National Security Agency wants a consolidated
The US National Security Agency is preparing for a unified cyber command center....
06 May 2009
 
» New US P2P bill aimed at limiting file sharing
The new bill, "The Informed P2P User Act", aims to limit file sharing over P2P networks....
06 May 2009
 
» $10 million in exchange for stolen medical records in Virginia
Hackers demand $10 million in exchange for stolen medical records of nearly 8.3 million Virginia patients....
05 May 2009
 
» McAfee not so free from security bugs
Even big-time antivirus software and Internet security provider McAfee was not spared by bugs....
05 May 2009
 
» Silent updates improve security, based on study
Automatic browser updates better than manual ones, based on Google and ETH study...
04 May 2009
 
» LexisNexis belatedly warns 32,000 users of credit card fraud
Over 32,000 customers of LexisNexis at risk for credit card fraud....
04 May 2009
 
» Permabit's new product will take care of your bulk data
If storing your bulk data is a dilemma, have a look at Permabit's release, the 4010....
04 May 2009
 
» Panic over Conficker gives room for botnet
With more people looking at Conficker, cybervillains spread botnets with ease....
04 May 2009
 
» Security Update will solve Adobe Flash Media Server's
Adobe discovered a vulnerability in its Flash Media Server, but all it takes is a Security Update to fix this....
03 May 2009
 
» Botnet stole 70GB worth of data in 10 days
Researchers managed to hijack a botnet and found out it stole 70GB worth of data in just 10 days....
03 May 2009
 
» WordPress vulnerable to security attacks
WordPress vulnerability discovered; users advised to upgrade at once....
03 May 2009
 
» Sensitive information on British health patients stolen
Trusts of the UK's National Health Service (NHS) were reminded of patient privacy due to four recent breaches....
02 May 2009
 
» Lenovo releases secure AES-encrypted USB
Lenovo releases its latest USB that is encrypted using the AES-algorithm, which has survived all cryptological attacks to date....
02 May 2009
 
» Twitter hacker viewed celebrities' personal info
French hacks Twitter; celebrities' personal info, among others, jeopardized...
02 May 2009
 
» Security software should learn from Conficker, experts say
With the Conficker bug exhibit very sophisticated behavior and dodging efforts to fight it, experts believe security software manufacturers should learn from Conficker to stop further cases of massive...
01 May 2009
 
» 16-year-old Swede hacked Cisco, NASA, and others
Encroachment of NASA and Cisco, among others, traced to a 16-year-old Swede....
01 May 2009
 
» Electronic voting machines not immune to tampering
Electronic voting systems may still be vulnerable to vote fixing and tampering, a study done by the CIA shows regarding electronic voting in many foreign nations....
30 April 2009
 
» Electronic health records not hack proof
The recent shift to electronic health records from the old filing system may not be as safe as they are supposed to be, but companies are taking advantage of this to offer companion services to enhanc...
30 April 2009
 
» Experts hijack Torpig botnet to learn more about its extent
For ten days, security researchers were able to gain control to the Torpig botnet, and glimpse the extent of the damage it has done as well as the motives and direction the botnet is going....
30 April 2009
 
» Businesses in Asia Pacific vulnerable to information
Symantec showed in its report that businesses in the Asia Pacific and Japan are quite vulnerable to increased information attacks, with Hong Kong a standout among them with a casual attitude toward se...
29 April 2009
 
» EU cyber security superbody proposed
Despite an information exchange body already set up, the head of EU's information and media wants to create a position in the EU to adequately deal with the information network security of the contine...
29 April 2009
 
» Chrome, Firefox users most up to date, says study
A study by Google shows Firefox and Chrome users are ahead when it comes to securing their browsers by using the latest version, a result the study believes to be largely due to the effectiveness of a...
29 April 2009
 
» Conficker bug found in medical devices
Apparently not only contained in normal PCs, the Conficker worm has recently been spotted in medical devices running an unpatched operating system. Experts worry this may yet cause damage and trouble ...
28 April 2009
 
» Games pose privacy and security threat
Security experts discussed how online gaming worlds can provide scammers and other individuals avenues to exploit security lapses and profit from the ever-expanding user base....
28 April 2009
 
» EV SSL not immune to hacking, phishing attacks
Vendors of the more expensive EV SSL certificates claim they can thwart any attempt hackers make to hijack user-initiated sessions, but two researchers show how their assumption may be wrong....
28 April 2009
 
» Scammers play on fears to get information, money
In an ever fearful atmosphere caused by real threats of malware attack, scammers are playing on these fears to trick users into paying them for fraudulent software, Microsoft reports....
27 April 2009
 
» Faulty HTTPS implementations risks users
While users have grown accustomed to HTTPS as a secure protocol, improper implementation of HTTPS may compromise users and nullify any potential protection - a fact that hackers may have been exploiti...
27 April 2009
 
» New bill set to replace unpopular US cyber security act
With FISMA's unpopularity and perceived lack of actual security improvements implementation a new set of guidelines and governing rules is being propose to replace this older act....
27 April 2009
 
» Firewalls need to adapt roles from barrier to gatekeeper
With the increasing number of mobile devices connecting to online systems and networks, firewalls need to do more than prevent unwarranted external access but also provide security for mobile access....
26 April 2009
 
» Russian ex-employee faces deportation for extorion
A Russian immigrant fired from a US investment firm may find his immigration status in jeopardy as he is charged with blackmaliling his former with threats of enlisting hackers to compromise their sys...
26 April 2009
 
» Swine flu a good time for scammers
With the swine flu spreading in different parts of the world, malicious scammers play on fears to trick more people into downloading malware. Meanwhile, other Internet companies have set up efforts to...
26 April 2009
 
» Security group addresses cloud computing risks
A new security group focusing on cloud security was formed to address the growing issues regarding securing the ever increasingly popular cloud computing service....
25 April 2009
 
» Federal agencies complying to ever stricter standard
A government-wide report on compliance to federal standards for IT security have shown that government agencies have complied as a whole; this is despite some sentiments that the security measures and...
25 April 2009
 
» Adobe finds yet another critical security hole
Another security vulnerability was reported by Adobe in their Adobe Reader program which may be exploited by hackers looking to execute malicious code on machines....
25 April 2009
 
» Hackers outsourcing captcha-bypassing activities
With captcha technology being more and more successful in repelling automated bot attacks, hacker groups turn to captcha -breaking groups and take advantage of cheap labor to break into social network...
24 April 2009
 
» Theft of government laptop sends residents into panic
More than a million residents of Oklahoma had their Social Security numbers compromised when a laptop containing sensitive information was stolen from a government employee....
24 April 2009
 
» Paradigm shift necessary to adapt to changing securi
The president of Symantec suggest that instead of trying to patch individual holes in a system's security, organization should look to automize and integrate solutions to better protect their assets....
24 April 2009
 
» Top botnets easily spams 25,000 messages an hour
Two botnets are among the most prolific spammers online, a study shows when researchers infect machines on purpose and observe their behavior....
23 April 2009
 
» UK man's money disappears from account, doubts placed
When money disappears from a UK man's account, he claims that someone else took it without using his card. ...
23 April 2009
 
» Obama's helicopter details leaked via P2P
P2P clients may have unwittingly compromised security plans of President Obama's helicopter and may have possibly leaked it to Iran, a report shows by an online security group....
23 April 2009
 
» Obsolete phone fetching staggering prices due Crimin
While the phone may seem outdated for today, criminal groups are paying good money to obtain certain handsets for use in committing high-tech online bank heists. ...
22 April 2009
 
» NSA wants to work together to keep US systems secure
Relaxing concerns over NSA's role in United States cyber security, NSA chief Lt. Gen. Keith Alexander spoke at the RSA Conference 2009 that the NSA was not only willing to help in the effort but also ...
22 April 2009
 
» Experts debate balancing security and privacy
As experts convene in the RSA Conference to discuss managing the tension existing between upholding public security, different issues are tackled on how to promote both aspects without sacrificing one...
22 April 2009
 
» Businesses, credit card industry struggle hackers
The rapidly developing hacking community has but credit card companies and businesses at odds - debating whether the current credit card industry information security standards are up to the task of e...
21 April 2009
 
» Security experts ponder on the future of cloud Compu
While cloud computing is the latest buzzword to circulate around the Internet, experts view this new paradigm with varying degrees of anticipation. But all agree on the new security challenges this sy...
21 April 2009
 
» Pentagon creating cyber security superbody
The Pentagon is forming an umbrella security group to handle cyber security for the different branches of the military and the Department of Defense, in light of recent reports of hackers stealing awa...
21 April 2009
 
» Conficker botnet smaller than worst fear
Experts show that rather than the millions of infected machines expected from the recent updating of the Conficker worm, the figures show a significantly smaller network of infected computers communic...
20 April 2009
 
» Dirty devices invading US market
Industry experts are asking whether the recent influx of infected computers and devices are a product of deliberate espionage or merely substandard industry practices abroad?...
20 April 2009
 
» FBI engages in own phishing and hacking
With the release of documents pertaining to FBI's cyber security activities, concerns rise whether the FBI may be abusing their powerful and effective surveilance software by using them too often in c...
20 April 2009
 
» Macs not safe from malware anymore
While Mac users were once confident in the security of OS X, the recent discovery of the world's first known MAC OS X have shown that the increasing number of Mac users have not escaped the eye of mal...
19 April 2009
 
» Twitter hacker gets job for his efforts awarded
As his high profile hacking of Twitter continue to attract a lot of attention, 17 year-old Michael Mooney has received offers to do security analysis from certain companies. This is amid growing conce...
19 April 2009
 
» P2P snooping may leave users guilty by association
P2P users used to feel safe within the crowd of millions of other users downloading content, but new research shows certain patterns in networking which maybe exploited by corporations looking to clam...
19 April 2009
 
» SonicWall server glitch leaves networks unprotected
An outage at SonicWall's licensing server disabled subscription-based security services for customers for at least several hours on Tuesday, according to the company and an angry customer....
04 December 2008
 
» Worm uses familiar brands to lure people
On Tuesday security vendor WebSense issued an alert warning that holiday coupon e-mails from familiar companies may be malicious code in disguise, in this case a mass-mailing e-mail worm....
04 December 2008
 
» Whither Cisco MARS? IT Security Monitoring? Security
Cisco System's Security Monitoring for Threat Identification, Mitigation, and Compliance (aka MARS) product is the company's offering for security and compliance ...
04 December 2008
 
» Microsoft learns of successful RPC worm infections
It's been more than a month since Microsoft issued an emergency out-of-band patch to fix a remote call procedure (RPC) flaw, but the software maker says some companies are learning the hard way by fai...
03 December 2008
 
» Skype Scrambles After Breach And Censorship Info
American companies operating in China have what might be considered a tradition of getting in trouble over privacy and censorship...
01 December 2008
 
» Apple iPhone 2.2 update includes critical security
Apple issued version 2.2 of its iPhone firmware, repairing at least a dozen security issues, including dangerous flaws in its Safari browser that attackers can exploit to steal passwords, account info...
28 November 2008
 
» Defense Companies Hit By Malicious Code
This one definitely goes well beyond "whoops? while a few security stories relate to fairly harmless issues. ...
12 November 2008
 
» Microsoft himss increases health user group to EMEA
Microsoft Corporation and the Healthcare Information and Management Systems Society (HIMSS) have recently announced the availability of the Microsoft Health user group (Microsoft HUG) all over Europe,...
08 November 2008
 
» Cyber criminals take advantage of Obama
After Barack Obama's historic win in the US presidential elections has created a sensation all around the world, the cyber criminals got a great chance to spread malware in the form of his campaigning...
08 November 2008
 
» Adobe Reader is unprotected Vulnerable to hacks
Core security Technologies advised millions of individuals and business firms around the world who use Adobe Reader PDF file viewing software, which is unprotected and open to attack. ...
07 November 2008
 
» Americans are alert about cyber crimes security conc
According to a recent survey conducted by the National Cyber security Alliance (NCSA) reveal that more and more ...
05 November 2008
 
» Scan On For the List of Malicious Malware Programs
* Tixcet.A: masked as a Microsoft Word file, this worm will try to turn Halloween into a nightmare by deleting files with specific extensions (.DOC, .MP3, .MOV, .ZIP, .JPG, etc.). ...
03 November 2008
 
» Google alters JotSpot privacy settings after complaint report
Google said Friday that it was altering the privacy settings on its JotSpot online collaboration service afterwards a researcher came across that user e-mail addresses and names were being exhibited t...
01 November 2008
 
» Master Piece of Crimeware Ever Created
The Sinowal trojan has stolen 500,000 online bank accounts and credit and debit cards. RSA stated the trojan virus has infected computers all over the world. "The effect has been rattling worldw...
01 November 2008
 
» Data Security Breach over Top Most MNC
Scarcely a day passes away without additional security breach casting at peril the personal details of the UK public. ...
31 October 2008
 
» Bakasoftware Russian Scareware Named and Shamed
A Russian software company has goldbricked millions of revenue out of foreigners by involving into a web security scam. ...
31 October 2008
 
» Web Security Firm Warns to be Vigilant Of Obfuscated
A Modern compromise at a corporation directed to a noteworthy amount of data being stolen, ...
31 October 2008
 
» Lab Screens Evidence That Personal Records Are Leaking
Bank account numbers, health records, social security numbers and internal auditing operations are examples of the kinds of information that is unknowingly "leaking" out from data centers. This agitat...
30 October 2008
 
» Fraudsters Get Into the Cloud Cyber Scams Beware
Cyber-terrorists are employing the ideas of cloud computing to internet fraud in a move that means even technically illiterate criminals can move into cybercrime. ...
30 October 2008
 
» Malicious programs a problem for New York Internet
Just about a quarter of New York State Internet users happened to find a badware infection on their computer ...
30 October 2008
 
» United States Senate candidate has email hacked
SARASOTA - As campaigns get into the final week, a Suncoast candidate opposes when she finds herself vulnerable by an internet hacker. ...
29 October 2008
 
» Security Blue Print Has Levied A Path in Building C
IT professionals, while aligning IT operations with the organization?s broader strategic goals, they must also maintain and establish a definite security strength which ensures compliance with listing...
27 October 2008
 

UTM Firewall - Vulnerability Scanner Free Security Resources
Free Vulnerability Scan

Free Security Webinar

IT Security Compliance with
hipaa compliance, cve compliance
WiFi Password Finder Awards & Reviews
Best IT Security Company
Best IT Security Products


Encyclopedia | Link Policy | Privacy Statement | Resources | Sitemap | User Policy



SecPoint® © Copyright 1999-2015
US Toll Free: +1-855-489-3724 - EU Toll Free: +44-808-101-2272