phishing - News, Features, and Slideshows
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
By Tony Bradley | 09 March, 2011 06:06
Security researchers have shown that carefully crafted text messages sent to cell phones via short message service (SMS) can cause them to shutdown without the knowledge of the owner.
By Keir Thomas | 08 January, 2011 05:49
The head of the U.S. Federal Bureau of Investigation has stopped banking online after nearly falling for a phishing attempt.
By Robert McMillan | 08 October, 2009 06:15
Sometimes, it seems scams are becoming almost as common as social media experts on Twitter. The latest one, unleashed Monday morning and initially noticed by tech blog Mashable, centers on a fake blog hosted at the domain twittersblogs.com. Tweets containing links to the site circulated rapidly, each featuring the message: "omg!! is it true what they wrote about you in their twit blog?"
By JR Raphael | 30 June, 2009 07:21
Forewarned is forearmed. We investigate the latest and most deadly tech dangers, and explain how to fight back.
By Andrew Brandt, Rosemary Hattersley, Robert McMillan and JR Raphael | 06 May, 2009 13:37
What the average guy might call a con is known in the security world as social engineering. Social engineering is the criminal art of scamming a person into doing something or divulging sensitive information. These days, there are thousands of ways for con artists to pull off their tricks (See: Social Engineering: Eight Common Tactics). Here we look at some of the most common lines these people are using to fool their victims..
By Joan Goodchild | 17 February, 2009 09:03
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
This whitepaper looks into one of Australia’s largest engineering, contracting and service organisations and why they have chosen to adopt VDI, their goals and achievements since implementation. •Provides advice to technology leaders considering their own workplace strategy and/or evaluating VDI •Major benefits found in cost management through the centralisation of infrastructure •Productivity and employee engagement increased through more efficient mobilisation of over 20 processes
- US Senate blocks NSA surveillance reform bill
- Amazon rules Gartner's magical box
- Google gives Android developers new tools for tracking app performance
- Microsoft offers Windows 10 carrot, threatens with stick
- US Senate leader pushes to extend NSA phone dragnet
- IBM defends use of temp visa workers
- Marines test augmented reality battlefield
- Pebble Time smartwatch to begin shipping on May 27
- Adblock browsers for Android and iOS to keep mobile ads, tracking at bay
- Torque G02 smartphone doesn't mind a saltwater dunk
- The Upload: Your tech news briefing for Friday, May 22
- Factory reset in Android phones leaves sensitive user data behind
- Secom security drone follows, photographs intruders
- Alibaba's UC Browser found leaking users' data
- Freelance hacking site vows to clean up dodgy listings