New DDoS defence technology launched
Simwood has launched a defence technology that it claims can be used defend against distributed denial of service (DDoS) attacks.
More results...
Simwood has launched a defence technology that it claims can be used defend against distributed denial of service (DDoS) attacks.
A threats analyst with Trend Micro is reporting that another piece of Android malware – from the Nickispy family – has been spotted in the wild. As with other versions of Nickispy, the malware eavesdrops on users and data sessions on the infected mobil…
Whilst carder forums and other types of illegal card credential exchanges are numerous on the darker side of the internet, security researcher Brian Krebs has revealed that a major vendor of stolen card details has been hacked, presumably by his/her fe…
LinkedIn has responded to criticism of its “social ads” feature over its use of members’ names and photos in advertisements on its website.
The University of Wisconsin-Milwaukee (UWM) has notified 75,000 students and staff members that their personal information, including social security numbers, may have been compromised as the result of a data breach.
Sophos has warned LinkedIn users of the need to be aware of a change to the business social networking site’s privacy policy, apparently allowing the site to use member’s names and photos in promotional advertisements. The change, says the IT security …
Here’s an interesting – if cautionary – tale of how an Apple store in Canada apparently refused to hand back a stolen iPhone to a woman, despite police and Apple’s database as confirming the hardware was registered to her.
GFI Software’s senior threat researcher has warned about a Russian website that is apparently offering various low-cost versions of the CCleaner PC utility, which is widely used to remove unwanted files, fix problematic registry entries and the like. T…
The International Organization for Standardization (ISO) has teamed up with the International Electrochemical Commission (IEC) to publish joint security and privacy standards regarding the use of biometric data for authentication.
A new type of exploitation technique is making use of improper implementation of proprietary protocol specifications, warns an analysis by researchers from Alert Logic.