PandaLabs reveals password-stealing fake Facebook pages
PandaLabs, the malware labs division of Panda Security, has encountered a fake Facebook page designed to steal passwords from users of the social networking portal.
More results...
PandaLabs, the malware labs division of Panda Security, has encountered a fake Facebook page designed to steal passwords from users of the social networking portal.
Verbatim has taken the wraps off a Secure ExpressCard-based solid state drive (SSD) with onboard 256-bit hardware encryption.
The Zbot trojan – which typically distributes itself via emails pointing at or supplying an infected download – has been spotted targeting customers of the Verizon and Vodafone mobile phone networks on both sides of the Atlantic.
Microsoft has announced guidance for applying secure programming techniques for agile software developers. The company rolled out new guidelines that will enable agile software developers to apply its Security Development Lifecycle (SDL) guidelines.
A group of MPs have voiced their opinion that the extradition to the US of self-confessed UFO hacker Gary McKinnon should be halted – and that he should stand trail in the UK – owing to the “precarious state of (his) mental health”.
avast! CEO Vincent Steckler told Infosecurity this week that the new version of the free avast! anti-virus includes more capabilities such as behavioural detections at the same time as being faster and smaller. It can also wake up your computer in the …
Just days after an iPhone worm was discovered in the wild, Mac security firm Intego has discovered a hacker tool targeting the iPhone that exploits the same vulnerability.
Understanding what goes on at the various secret service divisions such as MI5 and MI6, as well as GCHQ, has been helped with the news that Qosmos, a network intelligence specialist, will unveil an LI (lawful interception) edition of its ixMachine at M…
An unknown hacker – apparently protesting about terror deaths in Pakistan – has attacked the Durham Police website, forcing it to temporarily close.
Botnet controllers have been using cloud based systems such as the Google cloud platform as command and control nodes for infected PCs, said a researcher at Arbor Networks.