Advisories  

  •  
  • By Eduard Kovacs
  • May 10th, 2012
Shady Windows Technicians Use LogMeIn to Take Control of Devices

Shady Windows Technicians Use LogMeIn to Take Control of Devices

Here's a cool trick that may discourage the crooks from calling people

  •  
  • By Eduard Kovacs
  • May 10th, 2012
DHS Urges Users to Check for DNSChanger Malware, Time Is Running Out

DHS Urges Users to Check for DNSChanger Malware, Time Is Running Out

The clean DNS servers will be taken down on July 9

  •  
  • By Eduard Kovacs
  • May 10th, 2012
Expert: Firms’ Inability to Fend Off MitM Attacks Allows Crooks to Steal Billions

Expert: Firms’ Inability to Fend Off MitM Attacks Allows Crooks to Steal Billions

A phishing scheme recently busted by the FBI is a perfect example

  •  
  • By Eduard Kovacs
  • May 2nd, 2012
Experts Make Poll to Better Understand Fake Tech Support Calls

Experts Make Poll to Better Understand Fake Tech Support Calls

Anyone can complete the ISC survey to help the researchers

  •  
  • By Eduard Kovacs
  • April 30th, 2012
FBI Issues Advisory on Social Networking Risks

FBI Issues Advisory on Social Networking Risks

Humans are cataloged as being the weakest link in security

  •  
  • By Eduard Kovacs
  • April 25th, 2012
ICO: Many Fail to Delete Personal Data Before Selling Storage Devices

ICO: Many Fail to Delete Personal Data Before Selling Storage Devices

If not removed, the data can be misused by fraudsters

  •  
  • By Eduard Kovacs
  • April 23rd, 2012
Expert Offers Tips on How to Clean Up a Computer

Expert Offers Tips on How to Clean Up a Computer

Avira expert reveals how spring cleaning must be done on a computer

  •  
  • By Eduard Kovacs
  • April 5th, 2012
ABB Refuses to Patch Vulnerabilities in Legacy Systems

ABB Refuses to Patch Vulnerabilities in Legacy Systems

The products are almost at the end of their life cycle

  •  
  • By Eduard Kovacs
  • March 15th, 2012
Petition: Remove the Baby Charity Scam Photos from Facebook

Petition: Remove the Baby Charity Scam Photos from Facebook

Sign a petition to convince Facebook that these hoaxes should be addressed properly

  •  
  • By Eduard Kovacs
  • March 14th, 2012
Location-Based Social Media Poses Security Risks to Military

Location-Based Social Media Poses Security Risks to Military

Even the most "innocent" pictures can result in the loss of lives

  •  
  • By Eduard Kovacs
  • February 27th, 2012
Manchester United and 59 Other Sites Named Vulnerable by Zer0Freak

Manchester United and 59 Other Sites Named Vulnerable by Zer0Freak

All the sites are very popular and the abuse of the flaws could have serious consequences

  •  
  • By Eduard Kovacs
  • February 27th, 2012
Security Holes Found in 25 “Verisign Trusted” Online Stores (Exclusive)

Security Holes Found in 25 “Verisign Trusted” Online Stores (Exclusive)

The grey hat called Freedom returns with some interesting finds

  •  
  • By Eduard Kovacs
  • February 14th, 2012
The Privacy and Security Risks Posed by Online Dating Services

The Privacy and Security Risks Posed by Online Dating Services

Learn about the dangers that lurk on online dating sites

  •  
  • By Eduard Kovacs
  • February 14th, 2012
Metropolitan Police: Beware of Law Enforcement Viruses

Metropolitan Police: Beware of Law Enforcement Viruses

Law enforcement agencies want to make sure that the public is aware of the scams

  •  
  • By Eduard Kovacs
  • February 6th, 2012
German Government Guides Consumers and Businesses on Security

German Government Guides Consumers and Businesses on Security

The BSI recommendations always leave their mark on products used by consumers

  •  
  • By Eduard Kovacs
  • February 6th, 2012
Stop Sick Children Hoaxes from Spreading, Raise Awareness

Stop Sick Children Hoaxes from Spreading, Raise Awareness

Help pressure Facebook into better dealing with these scams

  •  
  • By Eduard Kovacs
  • January 30th, 2012
US-CERT Warns About Anonymous DDOS Attacks

US-CERT Warns About Anonymous DDOS Attacks

There are some things users and administrators can do to mitigate potential attacks

 
Want more? Browse: