phishing - News, Features, and Slideshows
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
By Tony Bradley | 09 March, 2011 06:06
Security researchers have shown that carefully crafted text messages sent to cell phones via short message service (SMS) can cause them to shutdown without the knowledge of the owner.
By Keir Thomas | 08 January, 2011 05:49
The head of the U.S. Federal Bureau of Investigation has stopped banking online after nearly falling for a phishing attempt.
By Robert McMillan | 08 October, 2009 06:15
Sometimes, it seems scams are becoming almost as common as social media experts on Twitter. The latest one, unleashed Monday morning and initially noticed by tech blog Mashable, centers on a fake blog hosted at the domain twittersblogs.com. Tweets containing links to the site circulated rapidly, each featuring the message: "omg!! is it true what they wrote about you in their twit blog?"
By JR Raphael | 30 June, 2009 07:21
Forewarned is forearmed. We investigate the latest and most deadly tech dangers, and explain how to fight back.
By Andrew Brandt, Rosemary Hattersley, Robert McMillan and JR Raphael | 06 May, 2009 13:37
What the average guy might call a con is known in the security world as social engineering. Social engineering is the criminal art of scamming a person into doing something or divulging sensitive information. These days, there are thousands of ways for con artists to pull off their tricks (See: Social Engineering: Eight Common Tactics). Here we look at some of the most common lines these people are using to fool their victims..
By Joan Goodchild | 17 February, 2009 09:03
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
CA commissioned Ponemon Institute to survey 748 IT and IT security practitioners for the 2013 Security of Cloud Computing Users study to see how cloud security has progressed over 2 years. This Infographic will show you the results - while security is improving, lingering doubts remain.
- Sale of Mt. Gox-related Bitcoins.com halted after court order
- Qualcomm faces hurdles collecting royalties from China
- Twitter employees mainly male and white, says it has 'lot of work to do'
- Facebook isn't giving up on search
- Firm says vulnerability in Tails contained in I2P component
- More AT&T customers switch to paying for their phones
- Dropbox lures business users from consumer product
- Ultra high-def TVs still too expensive
- Facebook reports a big sales jump, helped by mobile ads
- SSD prices for hybrids, ultrathin laptops to flatten next year
- Microsoft verging on single OS across all devices
- Top 5 take-aways from Tim Cook on Apple's Q3 earnings call
- IBM aims to disrupt supercomputing market with Cloud enticements
- Microsoft again writes off Surface inventory, renews profitability doubts
- Arrests made after international cyber-ring targets StubHub