Security  

  •  
  • By Eduard Kovacs
  • September 21st, 2011
Norton's Study on Cost of Cybercrime Considered a Marketing Campaign

Norton's Study on Cost of Cybercrime Considered a Marketing Campaign

Norton might have oversold it when they compared it to global drug trade

  •  
  • By Eduard Kovacs
  • September 21st, 2011
Cisco Reveals Identity Services Engine Vulnerability

Cisco Reveals Identity Services Engine Vulnerability

A set of default credentials can give administrators a headache

  •  
  • By Eduard Kovacs
  • September 21st, 2011
'Full Tilt Poker' Declared a Massive Ponzi Scheme

'Full Tilt Poker' Declared a Massive Ponzi Scheme

Board of directors accused of stealing hundreds of millions from player funds

  •  
  • By Eduard Kovacs
  • September 21st, 2011
Últimas Noticias and Others Injected with Malicious Code

Últimas Noticias and Others Injected with Malicious Code

Learn how to protect your website against SQL injections

  •  
  • By Eduard Kovacs
  • September 21st, 2011
McAfee Proposes New Approach on Protecting Mobile Devices and Data

McAfee Proposes New Approach on Protecting Mobile Devices and Data

A three-pronged approach should make sure that company data and devices are secure

  •  
  • By Eduard Kovacs
  • September 21st, 2011
White Hat Hackers: Barack Obama's Website Vulnerable

White Hat Hackers: Barack Obama's Website Vulnerable

The president should better protect his virtual propriety

  •  
  • By Eduard Kovacs
  • September 20th, 2011
DigiNotar Declared Bankrupt After ComodoHacker Attack

DigiNotar Declared Bankrupt After ComodoHacker Attack

DigiNotar technology will be integrated in some of the new products developed by VASCO

  •  
  • By Eduard Kovacs
  • September 20th, 2011
Highly Elaborate Phishing and SIM Card Fraud in Malaysia

Highly Elaborate Phishing and SIM Card Fraud in Malaysia

Complex banking fraud methods are developed by hackers

  •  
  • By Eduard Kovacs
  • September 20th, 2011
SSL Encryption Turns Out to Be Highly Vulnerable

SSL Encryption Turns Out to Be Highly Vulnerable

Account credentials can be decrypted in 10 minutes

  •  
  • By Eduard Kovacs
  • September 20th, 2011
3D Printers Used to Create ATM Skimmers

3D Printers Used to Create ATM Skimmers

A well-organized group of fraudsters made good use of new technologies

  •  
  • By Eduard Kovacs
  • September 20th, 2011
Cloud Security Is Not Transparent Enough to Be Trusted

Cloud Security Is Not Transparent Enough to Be Trusted

Cloud solutions providers and enterprises are not yet working in harmony

  •  
  • By Eduard Kovacs
  • September 20th, 2011
Turkish Hackers Confuse Israel with Palestine

Turkish Hackers Confuse Israel with Palestine

'Act now, think later' seems to be the motto of some cybercriminals

  •  
  • By Eduard Kovacs
  • September 20th, 2011
Bank of Melbourne Twitter Account Hacked

Bank of Melbourne Twitter Account Hacked

A phishing expedition was launched and unsuspecting customers took the bait

  •  
  • By Eduard Kovacs
  • September 20th, 2011
Skype Used to Spread Scareware

Skype Used to Spread Scareware

Automated voice calls inform you that you are unprotected

  •  
  • By Eduard Kovacs
  • September 20th, 2011
Major Security Flaws in Mac OS X Lion

Major Security Flaws in Mac OS X Lion

Passwords can be obtained and changed even by users with limited access

  •  
  • By Eduard Kovacs
  • September 19th, 2011
Google Alerts Spread ZeroAccess Trojans

Google Alerts Spread ZeroAccess Trojans

Search engines are loosing their credibility by offering links to compromised locations

  •  
  • By Eduard Kovacs
  • September 19th, 2011
Anonymous Hits Government Websites in Mexico

Anonymous Hits Government Websites in Mexico

They protest to the way the government handles violence and drug related crimes