• Fake Firefox warnings lead to scareware

    Updated: 2011-05-30 23:57:57
    A new scareware campaign is spreading that appears to be a Firefox malware warning page. Firefox users should stay safe by keeping a close eye on their clicks when presented with a warning. Read more…

  • PBS.org hacked... LulzSec targets Sesame Street?

    Updated: 2011-05-30 08:23:45
    Public Television in the United States is the latest organization to suffer a data loss incident. What motivates these criminal data breaches? Is any organization off limits? Read more…

  • Privacy and security in the cloud - is there any?

    Updated: 2011-05-30 00:05:52
    Is there any privacy or security in the cloud? And if so, is that because we'll all be spending so much time watching new YouTube videos, just to keep up, that we won't have time to give away personal information any more? Read more…

  • Honda Canada loses 283,000+ records, now faces lawsuit

    Updated: 2011-05-29 22:24:11
    Honda Canada disclosed a breach of their myHonda and myAcura websites that affected more than 283,000 Canadian Honda owners. Information stolen in the attack included names, addresses, Vehicle Identification Numbers and in some cases Honda Finance account numbers. Read more…

  • SSCC 61 - Sony, Honda, Mac Defender and best practices on securing your organization

    Updated: 2011-05-29 07:42:24
    Chester Wisniewski sits down with one of the most experienced Sophos technical support experts to discuss best practices and how we can use the tools we have to do a better job defending against modern malware. Read more…

  • USB Drive Hidden Video Recorder

    Updated: 2011-05-28 21:45:43
    The USB Drive Video Recorder is a small, motion activated video recording device. Records video as well as photos on up to a 32 GB micro SD card. Can even record while charging via USB, looking just like a standard flash drive.

  • US military contractors hacked - possible link with RSA SecurID breach

    Updated: 2011-05-28 16:04:18
    Hackers have broken into the network of Lockheed Martin and several other US military contractors, according to media reports. Read more…

  • 89% say they would tell Mac-using friends to install anti-virus, poll reveals

    Updated: 2011-05-27 12:31:55
    It appears that a sea change is occurring - with more and more Mac users realising the advantages of running anti-virus software to secure their computers. Read more…

  • Anatomy of an Attack comes to London and Sydney - book your place now!

    Updated: 2011-05-27 11:48:52
    Sophos is hosting events in London, UK and Sydney, Australia in the next few weeks where our experts will explain how malware threats actually work and what you can do to protect your business. Read more…

  • The GRC (platform) Fallacy

    Updated: 2011-05-26 16:03:00
    There’s a common mythos perpetuated by many security vendors (or, at least, by their sales forces) that you can buy a tool, install it, and problems will be solved. This mythos oftentimes short-circuits problem solving processes, jumping to “solutions” without doing earlier steps, such as defining the problem. More often than not we see this [...]

  • Hacking conference sees enemies' break boundaries Technology guardian.co.uk

    Updated: 2011-05-23 19:25:17
    Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to comments c Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Mobile site Sign in Register Text larger smaller About us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Digital edition Guardian Weekly Buy Guardian and Observer photos Subscribe Today's paper The Guardian G2 features Comment and debate Editorials , letters and corrections Obituaries Other lives Sport MediaGuardian Subscribe Zeitgeist Today's hot topics guardian.co.uk Technology User comments Web News Sport Comment Culture Business Money Life style Travel Environment TV Blogs

  • Hacking conference sees enemies' break boundaries Technology guardian.co.uk

    Updated: 2011-05-23 19:25:16
    Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to comments c Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Mobile site Sign in Register Text larger smaller About us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Digital edition Guardian Weekly Buy Guardian and Observer photos Subscribe Today's paper The Guardian G2 features Comment and debate Editorials , letters and corrections Obituaries Other lives Sport MediaGuardian Subscribe Zeitgeist Today's hot topics guardian.co.uk Technology User comments Web News Sport Comment Culture Business Money Life style Travel Environment TV Blogs

  • Security is More Than Cryptography

    Updated: 2011-05-20 19:43:09
    A vulnerability demonstration this week involving a technology that’s generating buzz reminded me of an important concept: Security is as much about implementation as the underlying technologies you use. You can put together several “secure” components and still build an insecure system. The example that reminded me of this relates to Bitcoin, a somewhat controversial [...]

  • Malware branching out

    Updated: 2011-05-19 12:15:29
    I recall back in the 80s, when “computer virus” was a new term, “antivirus software” hadn’t been invented yet, nobody had coined the term “malware”, and Apple was still running incomprehensible TV ads. It’s ironic: Apple computers were the predominant home computers when computer virii and malware were invented. And yet, the first malware kit [...]

  • fake anti-virus software Blog Central

    Updated: 2011-05-18 07:02:46
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive May 2011 24 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 330 Corporate 201 Enterprise 346 McAfee Labs 1069 Tags 1 million guarantee access to live fraud resolution agents Acquisition botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption

  • trojans Blog Central

    Updated: 2011-05-18 07:02:45
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive May 2011 24 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 330 Corporate 201 Enterprise 346 McAfee Labs 1069 Tags 1 million guarantee access to live fraud resolution agents Acquisition botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption

  • web threats Blog Central

    Updated: 2011-05-18 07:02:44
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive May 2011 24 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 330 Corporate 201 Enterprise 346 McAfee Labs 1069 Tags 1 million guarantee access to live fraud resolution agents Acquisition botnet Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption

  • Blue-Light Special on Zeus Blog Central

    Updated: 2011-05-18 07:02:42
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Jim Walter Jim Walter currently serves as manager of the McAfee Threat Intelligence Service MTIS for McAfee Labs , and focuses Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Carlos Castillo Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David

  • Number Theory 101

    Updated: 2011-05-17 21:03:37
    Disclaimer: I am *not* a mathematician. I just happened to take a Number Theory class from an awesome professor (Dr Blakley) at Texas A&M. When I took Dr Blakley’s Math 673 class, I was in over my head at first (and probably still would be if I hadn’t seen the applications of the topics in [...]

  • Kingsoft PowerWord 2011 released!

    Updated: 2011-05-17 12:10:13
    16th, May, 2011 from KSOffice Team Kingsoft PowerWord is an ideal e-dictionary for people at all levels, designed to meet your translation, research or study needs at your fingertips. This is why the software has 20 million users today, and is recommended by over 50,000 educational insitutes, government agencies and global corporations. In the May of 2011, [...]

  • A Cloud of Suspicion…

    Updated: 2011-05-11 05:41:18
    It may be true that cloud computing services are permeating nearly every facet of our networked world; but in the process of sharing our data with the companies that provide these resources, what do we do about the trust issue? Data in the cloud is vulnerable unless it’s protected somehow. And if this protection isn’t [...]

  • Stand alone – if you can

    Updated: 2011-05-05 12:35:41
    As you’ve doubtless heard, Sony’s PlayStation Network has been down for several days now. The exact cause of this outage, being apparently affected by hackers of some stripe, is doubtless worth investigating. However, since those details haven’t been fully divulged yet, it’s best to wait on that front. But this brings to light an increasing [...]

  • Bin Laden’s Computer

    Updated: 2011-05-04 16:38:55
    Time reports that Bin Laden’s computer contains a “mother lode of intel“. The article ends with the question: “The official posed the same question that’s likely on plenty of other people’s minds: ‘Can you imagine what’s on Osama bin Laden’s hard drive?’” The question on my mind is rather, with so much to lose, why [...]

  • Saving paper Way when printing in Kingsoft Office 2010(3)

    Updated: 2011-05-04 10:51:01
    4th, May, 2011 from KSOffice Team Many times, we print some articles for reading, because you can not plug into a computer all day long in the pocket; sometimes we make changes to print some document, as thinking to use color-coded signs on the computer is not an easy operation … … there is always something [...]

  • Francie Coulter Blog Central

    Updated: 2011-05-04 04:31:54
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive May 2011 4 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 319 Corporate 200 Enterprise 342 McAfee Labs 1064 Tags 1 million guarantee access to live fraud resolution agents Acquisition Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption Endpoint

  • May 2011 Blog Central

    Updated: 2011-05-03 04:10:36
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive May 2011 3 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 318 Corporate 200 Enterprise 342 McAfee Labs 1064 Tags 1 million guarantee access to live fraud resolution agents Acquisition Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption Endpoint

Current Feed Items | Previous Months Items

Apr 2011 | Mar 2011 | Feb 2011 | Jan 2011 | Dec 2010 | Nov 2010