Researcher Explains Why Scammers Say They Are from Nigeria

Researcher Explains Why Scammers Say They Are from Nigeria

A great study that shows the challenges faced by fraudsters

Money Should Be Spent on Internet Policing, Not Antiviruses, Researchers Say

Money Should Be Spent on Internet Policing, Not Antiviruses, Researchers Say

International scientists found a new way to calculate the costs of cybercrime

Admin Accounts and App Backdoors Exploited in Most Data Breaches, Survey

Admin Accounts and App Backdoors Exploited in Most Data Breaches, Survey

Most IT managers are aware of this, but they still fail to monitor access points

ENISA Publishes Report on Threats from Flame

ENISA Publishes Report on Threats from Flame

The paper reminds us of the weaknesses in cyber defenses

Security Brief: Flame, WHMCS and Controversy

Security Brief: Flame, WHMCS and Controversy

The main events of the week between May 28 and June 3

AlienVault: Firms Fear That Security Breaches Could Cost Lives

AlienVault: Firms Fear That Security Breaches Could Cost Lives

When it comes to snooping, China is held responsible by most companies

FBI Confirms Bitcoin Report, But Denies Making It Public

FBI Confirms Bitcoin Report, But Denies Making It Public

11 agencies worldwide received the document and any one of them could have leaked it

TechAmerica: Cybersecurity Keeps Federal Execs Awake at Night

TechAmerica: Cybersecurity Keeps Federal Execs Awake at Night

Budget cuts represent another problem for the CIOs of government companies

  • Xbox
  • By Andrei Dobra
  • May 5th, 2012
Xbox 720 Already in Production, Report Says

Xbox 720 Already in Production, Report Says

Microsoft is already building its next-generation home console

Experts Make Poll to Better Understand Fake Tech Support Calls

Experts Make Poll to Better Understand Fake Tech Support Calls

Anyone can complete the ISC survey to help the researchers

Symantec: 5.5 Billion Attacks Blocked in 2011

Symantec: 5.5 Billion Attacks Blocked in 2011

The report shows that religious sites were infected with more malware than adult sites

AVG: Android Malware Is Pushed via Twitter and Facebook

AVG: Android Malware Is Pushed via Twitter and Facebook

It's easy to monetize a malicious operation when there are so many potential victims

Phishing: Chinese Taobao.com Exceeds PayPal

Phishing: Chinese Taobao.com Exceeds PayPal

Chinese cybercriminals rely mostly on newly registered domains instead of hijacked sites

Microsoft: Conficker Still a Threat, Uses Weak Passwords to Spread

Microsoft: Conficker Still a Threat, Uses Weak Passwords to Spread

The company released its Security Intelligence Report Volume 12

ICO: Many Fail to Delete Personal Data Before Selling Storage Devices

ICO: Many Fail to Delete Personal Data Before Selling Storage Devices

If not removed, the data can be misused by fraudsters

Imperva: Hackers Use Automated Tools in Most Attacks

Imperva: Hackers Use Automated Tools in Most Attacks

Havij, SQLmap, and Acunetix are just some of these tools

Sophos “Dirty Dozen” Q1 2012 Report: India Is Number 1 Spam Source

Sophos “Dirty Dozen” Q1 2012 Report: India Is Number 1 Spam Source

The good news is that the number of spam messages worldwide has dropped since 2011

 
Want more? Browse: