Security  

  •  
  • By Eduard Kovacs
  • June 30th, 2012
Security Risks Posed by Internet Explorer 10 in Windows 8 Metro

Security Risks Posed by Internet Explorer 10 in Windows 8 Metro

A clever function could be leveraged by phishers to steal credentials

  •  
  • By Eduard Kovacs
  • June 29th, 2012
RiskRanker Detects Mobile Threats Without Relying on Malware Signatures

RiskRanker Detects Mobile Threats Without Relying on Malware Signatures

An innovative solution developed by experts from NQ Mobile and North Carolina University

  •  
  • By Eduard Kovacs
  • June 29th, 2012
SPECTOR 360 7.4: Activity Monitoring Solution for Firms That Use Mac OS

SPECTOR 360 7.4: Activity Monitoring Solution for Firms That Use Mac OS

The solution tracks email, file transfers, printing, searches, and browser history

  •  
  • By Eduard Kovacs
  • June 29th, 2012
Information Disclosure Bug Fixed in WordPress 3.4.1

Information Disclosure Bug Fixed in WordPress 3.4.1

Security has been hardened and 18 functionality issues have been addressed

  •  
  • By Eduard Kovacs
  • June 29th, 2012
APT Attacks Rely on New Mac OS X Backdoor to Target Uyghur Activists

APT Attacks Rely on New Mac OS X Backdoor to Target Uyghur Activists

Backdoor.OSX.MaControl.b steals files and executes commands on the infected machine

  •  
  • By Eduard Kovacs
  • June 29th, 2012
Scammers Improve National Lottery Commission Scam, Experts Find

Scammers Improve National Lottery Commission Scam, Experts Find

However, the fake emails are still far from being perfect

  •  
  • By Eduard Kovacs
  • June 29th, 2012
Remote DOS Vulnerability Addressed in VLC 2.0.2

Remote DOS Vulnerability Addressed in VLC 2.0.2

Two other security holes have also been fixed in the latest version

  •  
  • By Eduard Kovacs
  • June 29th, 2012
Cunard Shuts Down Booking System After Exposing Details of 1,200 Customers

Cunard Shuts Down Booking System After Exposing Details of 1,200 Customers

An unknown number of users received an email containing booking references and other data

  •  
  • By Eduard Kovacs
  • June 29th, 2012
Anonymous Hackers Leak Data from United Arab Emirates “Netfilter” Servers

Anonymous Hackers Leak Data from United Arab Emirates “Netfilter” Servers

The hacktivists explain why the government blocks VOIP services

  •  
  • By Eduard Kovacs
  • June 29th, 2012
UFC President: We Contributed to the Arrest of Hackers

UFC President: We Contributed to the Arrest of Hackers

Dana White believes that the information he provided to the FBI may have been useful

  •  
  • By Eduard Kovacs
  • June 29th, 2012
Laptop Containing Patient Data Stolen from Texas Cancer Center Physician’s Home

Laptop Containing Patient Data Stolen from Texas Cancer Center Physician’s Home

MD Anderson is offering credit monitoring services for those whose SSNs may be exposed

  •  
  • By Eduard Kovacs
  • June 29th, 2012
ENISA Wants a Cyber Insurance Market for European Companies

ENISA Wants a Cyber Insurance Market for European Companies

The computer systems and data of businesses and consumers could greatly benefit

  •  
  • By Eduard Kovacs
  • June 29th, 2012
Fortune 500 and US Government Agencies Still Infected with DNSChanger

Fortune 500 and US Government Agencies Still Infected with DNSChanger

Around 300,000 computers worldwide affected by the malware and July 9 is almost here

  •  
  • By Eduard Kovacs
  • June 28th, 2012
Experts Find Improvements in Classic Phishing Emails

Experts Find Improvements in Classic Phishing Emails

Old FedEx scam notifications appear to be legitimate at first glance

  •  
  • By Eduard Kovacs
  • June 28th, 2012
Top UK Universities Start Fixing SSL Security Issues as a Result of Study

Top UK Universities Start Fixing SSL Security Issues as a Result of Study

TechWeekEurope conducted a research to see how well institutions protected their systems

  •  
  • By Eduard Kovacs
  • June 28th, 2012
Study: Most Firms Send Sensitive Data via Email, but Fail to Protect It (Video)

Study: Most Firms Send Sensitive Data via Email, but Fail to Protect It (Video)

Most company executives fear public embarrassment if their emails were to get stolen

  •  
  • By Eduard Kovacs
  • June 28th, 2012
Western Australian Auditor General: Organizations Can’t Identify Cyber Attacks

Western Australian Auditor General: Organizations Can’t Identify Cyber Attacks

The controls implemented by ServiceNet offer the only protection in many cases

 
Want more? Browse: