Archive | Security

RSS feed for this section

Is Online Backup Secure?

The principles behind online backup and cloud storage services are quite simple. In most cases, in order to keep accurate and current copies of your information, a backup service will […]

Read full story · Comments { 0 }
giganews

Using A Public Hotspot? You Really Should Use A VPN

Without a personal VPN, hackers and data sniffers can tap into your connection on an unsecured public Wi-Fi Hotspot.

Read full story · Comments { 0 }
Chrome5

Potential Malware Threats Hit Chrome

Most of you are not surprised to hear that malware attacks can hit any browser, Internet Explorer is not necessarily weaker than other browsers in the security camp, they just […]

Read full story · Comments { 487 }
EpsilonBreach

Outsourced E-Mail Provider Epsilon – Hacked

Recent events in the area of Internet security have shown that big players can make a difference and shut down hackers or hacking sites. But on the other hand, hackers […]

Read full story · Comments { 76 }
rostock-dead

The Rustock Takedown Spam Down 33%

The Rustock Botnet was taken down earlier this month. It had accounted for billions of spam e-mails daily.  According to Symantec’s March 2011 MessageLabs Intelligence Report this is a big accomplishment […]

Read full story · Comments { 20 }
sms-o-death

Text Messages Of Death Threaten The 5 Billion Users

It’s fairly well known at this stage that high end smartphones like the iPhone, Android and Windows Mobile devices can all be hacked and have been, but surprisingly only 16% of all […]

Read full story · Comments { 1 }
toorcon_logo

Some Results from the ToorCon Security Conference

Harckers, security researchers at the ToorCon security conference in San Diego showed how easy it can be to poke holes in hardware and software with the right combination of tools, […]

Read full story · Comments { 106 }
Firefox_Malware

Dangerous Websites Part 2

Sites like Facebook give rise to new forms of phishing. For example, scammers might hijack a Facebook account, then use it to lure that person’s friends into clicking a friendly […]

Read full story · Comments { 35 }
conficker_final

Dangerous Websites – Part 1

Making calls can alert others about where you are. Because many mobile phones now carry Apps, they can be subjects of malware, or spyware, getting information about you. Watch what […]

Read full story · Comments { 0 }
Asp net

Microsoft To Ship ASP Security Patch

An attacker can decrypt cookies, view states, form authentication tickets, identify membership passwords, see user data, and anything else encrypted using the ASP.NET framework’s API. These issues are significant because […]

Read full story · Comments { 39 }
[4]

Virus Bulletin Results for August

The WildList is used as the basis for in-the-wild virus testing and certification of anti-virus products by several working groups like ICSA, Secure Computing, and Virus Bulletin.

Read full story · Comments { 16 }
Your PasswordCard - 33,216 printed so far! - Windows Internet Explorer

Two tools to help with secure passwords

Choosing a secure password to use online is second only in difficulty to knowing if that password is really secure or not.  I thought I’d share with you two tools […]

Read full story · Comments { 2 }