EXIF mining tool released
EviGator has released TAG Examiner, a tool for examining large quantities of image files to recover metadata.
More results...
EviGator has released TAG Examiner, a tool for examining large quantities of image files to recover metadata.
A Manhattan resident was sentenced last week for his part in an international money laundering and data theft scheme that hacked into accounts at brokerage firm Charles Schwab.
The Consumer’s Association has launched a publicity campaign against the law firms generating large numbers of copyright actions against alleged internet filesharers, and it appears to have paid off.
A new Windows Mobile game – apparently being offered free of charge – has a nasty surprise hidden inside; a trojan that makes very expensive international phone calls.
RootKitAnalytics has made a tool available for discovering hidden alternate data streams. Called StreamArmor, it is designed to analyze a feature of the Windows file system that allows hidden data to be embedded in files.
Nearly half of US IT professionals surveyed by ISACA said they believe that the security risks of cloud computing outweigh the potential benefits.
Protegrity, the Stamford, Connecticut-based enterprise data security specialist, is quietly making its presence felt in the UK and Europe, largely thanks to a growing network of resellers handling the firm’s products.
Research just released from Arbor Networks makes the interesting assertion that a new family of distributed denial of service (DDoS) botnets has arrived on the hacker scene.
Seventy people were arrested in Romania this week as part of an investigation of three organised criminal groups connected with cybercrime.
Kaspersky has successfully patented technology that enables analysts to trace the activity of software code without infringing upon intellectual property.