online safety - News, Features, and Slideshows
Subdomains that once served a purpose but later were forgotten by website administrators can be abused by hackers to attack users of sites under the same main domain.
By Lucian Constantin | 09 December, 2014 12:09
Vodafone UK isn't letting its customers access the website of the Chaos Computer Club (CCC), one of the oldest and largest associations of computer hackers in Europe.
By Lucian Constantin | 09 December, 2014 02:10
Facebook has partnered with antivirus firm ESET to offer users the ability to scan their computers for malware directly from inside the social networking site.
By Lucian Constantin | 04 December, 2014 03:37
A hacker group called the Syrian Electronic Army (SEA) scared visitors to several news websites on Thursday by posting rogue pop-up messages saying they'd been hacked.
By Lucian Constantin | 28 November, 2014 04:38
Over 23,000 Web servers were infected with a backdoor called CryptoPHP that's bundled with pirated themes and plug-ins for popular content management systems.
By Lucian Constantin | 28 November, 2014 02:45
Antivirus firm Bitdefender unveiled a hardware security appliance for home networks Tuesday that aims to protect devices by scanning network traffic to detect and block potential security threats.
By Lucian Constantin | 26 November, 2014 04:29
New security updates released for the WordPress content management system and one of its popular plug-ins fix cross-site scripting (XSS) vulnerabilities that could allow attackers to take control of websites.
By Lucian Constantin | 22 November, 2014 03:35
Attackers have started using the Citadel Trojan program to steal master passwords for password management applications and other authentication programs.
By Lucian Constantin | 21 November, 2014 04:35
A new organization supported by Mozilla, the Electronic Frontier Foundation and others is working to set up a new certificate authority (CA) that will provide website owners with free SSL/TLS certificates.
By Lucian Constantin | 19 November, 2014 02:23
A malware program distributed recently through a rogue server on the Tor anonymity network was also used in targeted attacks against European government agencies.
By Lucian Constantin | 15 November, 2014 03:38
Google released a tool that can be used to test whether the SSL/TLS encrypted connections opened by applications or devices are vulnerable to man-in-the-middle attacks.
By Lucian Constantin | 06 November, 2014 01:35
Some of the most widely used messaging apps in the world, including Google Hangouts, Facebook chat, Yahoo Messenger and Snapchat, flunked a best-practices security test by advocacy group the Electronic Frontier Foundation (EFF).
By Lucian Constantin | 05 November, 2014 06:42
The critical Shellshock vulnerabilities found last month in the Bash Unix shell have motivated security researchers to search for similar flaws in old, but widely used, command-line utilities.
By Lucian Constantin | 31 October, 2014 06:15
Users of Drupal, one of the most popular content management systems, should consider their sites compromised if they didn't immediately apply a security patch released on Oct. 15.
By Lucian Constantin | 31 October, 2014 01:50
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
This whitepaper discusses why the periodic refresh of an organisation’s PCs and devices makes sense from both IT and business perspectives, to maintain productivity and top-notch security. • As PCs age, the systems start to incur high maintenance costs and expose organizations to heightened security risks • There is a need to carefully match client computers to the requirements of the workforce • With the right combination of hardware, software and services, organisations can maximize the benefits of a client refresh while driving down cost and complexity
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack
- What we know about North Korea's cyberarmy