- By Lucian Constantin
- March 31st, 2009
Security Researchers Find Weakness in Conficker
Allowing them to identify compromised computers by scanning the network
- By Lucian Constantin
- February 17th, 2009
Google Launches Malvertising Search Engine
Aimed at helping ad networks do background checks on potential customers
- By Lucian Constantin
- February 9th, 2009
OpenDNS to Fight Conficker
The company will implement a new service to track and block infected systems
- By Lucian Constantin
- February 6th, 2009
Energy Distribution Systems Affected by New Vulnerabilities
Bugs in AREVA software open door to remote unauthorized access
- By Lucian Constantin
- January 13th, 2009
Storm Botnet Cleaning Method Revealed
But it cannot be applied due to legal constraints
- By Lucian Constantin
- December 10th, 2008
reCAPTCHA Recieves Security Improvement and New Audio Twist
The new audio implementation helps transcribe historical audio content
- By Lucian Constantin
- November 5th, 2008
Adobe Reader and Acrobat 8 Plagued by Remote Code Execution Vulnerabilities
Adobe released an advisory and patches for all of them
- By Lucian Constantin
- October 17th, 2008
Adobe Fixes Clickjacking and Clipboard Hijacking Vulnerabilities
The new Flash Player 10 prevents clickjacking and clipboard attacks
- By Lucian Constantin
- October 9th, 2008
Quantum Cryptography Reaches Unprecedented Speed
Toshiba researchers have broken the 1 Mbps QKD transfer barrier for the first time
- By Lucian Constantin
- September 26th, 2008
Massachusetts Has the Toughest Personal Information Data Security Standards
The state administration issues comprehensive identity theft prevention regulations
- By Lucian Constantin
- September 11th, 2008
Public Viewing of Arizona Death Certificates Halted Because of Identity Fraud
The death notices from Maricopa County will no longer be available on a public website
- By Lucian Constantin
- September 11th, 2008
McAfee Takes Real-Time Protection Into the Cloud
The new Artemis technology offers real-time protection directly from the Internet
- By Denisa Ilascu
- September 6th, 2008
Blind Spot Eye Identification to Be Employed in Security Systems
Japanese researchers hope
- By Lucian Constantin
- September 5th, 2008
Heartbeat Encryption - Literally
Researchers secure wireless communication with medical implants by using heartbeat-based encryption
- By Lucian Constantin
- September 1st, 2008
Unprecedented Security Improvements to Combat DNS Cache Poisoning
Nominum has released a major security update that severely reduces success rate of DNS attacks
- By Lucian Constantin
- August 30th, 2008
Companies Handling Credit Card Data Get New Security Policies
The PCI Security Standards Council will release the Data Security Standard version 1.2