Advisories  

  •  
  • By Eduard Kovacs
  • February 4th, 2013
Cybercriminals Might Abuse the Data Stolen from Twitter, Experts Warn

Cybercriminals Might Abuse the Data Stolen from Twitter, Experts Warn

Sophos has published a useful advisory on the subject

  •  
  • By Eduard Kovacs
  • January 30th, 2013
Incident Response Is Only the First Step in Proactive Threat Mitigation, Experts Say

Incident Response Is Only the First Step in Proactive Threat Mitigation, Experts Say

Solutionary has published an interesting advisory

  •  
  • By Eduard Kovacs
  • January 22nd, 2013
Cybercriminals Use Legitimate Tools in APT Attacks, Experts Say

Cybercriminals Use Legitimate Tools in APT Attacks, Experts Say

Trend Micro experts provide some valuable advice for IT security teams

  •  
  • By Eduard Kovacs
  • January 7th, 2013
Yorkshire Bank Warns Customers of Phone Scams

Yorkshire Bank Warns Customers of Phone Scams

The scammers deploy a clever trick to dupe their victims

  •  
  • By Eduard Kovacs
  • January 4th, 2013
TURKTRUST Incident Shows That Certificate-Based Attacks Are a Preferred Vector

TURKTRUST Incident Shows That Certificate-Based Attacks Are a Preferred Vector

Experts from Venafi and Sophos share some valuable insight on the matter

  •  
  • By Eduard Kovacs
  • January 3rd, 2013
Scam and Identity Theft Protection Advisory for 2013 – Video

Scam and Identity Theft Protection Advisory for 2013 – Video

Scambook provides 5 tips on how to stay safe in the new year

  •  
  • By Eduard Kovacs
  • December 21st, 2012
BBB Warns Users About Scam Charities Leveraging Newtown Shooting

BBB Warns Users About Scam Charities Leveraging Newtown Shooting

The agency provides 10 useful tips for those who want to make donations

  •  
  • By Eduard Kovacs
  • December 20th, 2012
NASA Unlikely to Meet December 21 Computer Encryption Deadline

NASA Unlikely to Meet December 21 Computer Encryption Deadline

That's according to a review made by the agency's inspector general

  •  
  • By Eduard Kovacs
  • December 18th, 2012
Samsung Exynos Kernel Exploit Highlights the Risks of the BYODTrend

Samsung Exynos Kernel Exploit Highlights the Risks of the BYODTrend

Nick Cavalancia of SpectorSoft explains why such vulnerabilities are dangerous

  •  
  • By Eduard Kovacs
  • December 18th, 2012
Advisory for Businesses: How to Protect Your Networks During the Holidays

Advisory for Businesses: How to Protect Your Networks During the Holidays

GFI Systems offers some important advice on securing a company during the festive break

  •  
  • By Eduard Kovacs
  • December 17th, 2012
Advisory: How to Protect Your Information from Device Loss When Traveling

Advisory: How to Protect Your Information from Device Loss When Traveling

Five simple tips and a clever piece of software you can use

  •  
  • By Eduard Kovacs
  • December 14th, 2012
Recent DDOS Attacks Have Made Organizations Increase Mitigation Controls, Expert Says

Recent DDOS Attacks Have Made Organizations Increase Mitigation Controls, Expert Says

Rob Kraus, director of Solutionary’s Security Engineering Research Team, offers insight

  •  
  • By Eduard Kovacs
  • December 12th, 2012
Mobile Apps for Children Still Not Good Enough When It Comes to Privacy Disclosures

Mobile Apps for Children Still Not Good Enough When It Comes to Privacy Disclosures

The FTC has issued its second report on this topic

  •  
  • By Eduard Kovacs
  • December 10th, 2012
Fraudsters Are Setting Up Bogus Hotel Websites, Experts Find

Fraudsters Are Setting Up Bogus Hotel Websites, Experts Find

Identity theft, money laundering, and profit made from advance payments

  •  
  • By Eduard Kovacs
  • December 6th, 2012
Monitoring Software Could Be the Solution for Mitigating Insider Threats

Monitoring Software Could Be the Solution for Mitigating Insider Threats

SpectorSoft representatives share some valuable insight

  •  
  • By Eduard Kovacs
  • December 6th, 2012
Queen Elizabeth II and Prince Charles Prank Call Highlights the Perils of Social Engineering

Queen Elizabeth II and Prince Charles Prank Call Highlights the Perils of Social Engineering

Here's some expert advice on how to protect yourself and your company against this threat

  •  
  • By Eduard Kovacs
  • December 5th, 2012
Experts Advise Users to Stop Sharing Pictures of Credit Cards and IDs on the Web

Experts Advise Users to Stop Sharing Pictures of Credit Cards and IDs on the Web

Instagram, Twitter and Facebook are flooded with sensitive information

 
Want more? Browse: