The latest 3GS iPhone is a valuable piece of kit and, as you might expect, a number get stolen every day, but Ian Kellett of Cumbria managed to harness his iPhone’s global positioning system (GPS) when his handset went missing one Saturday last month.
US to be hit by simulated cyberattack
On Tuesday, the US will undergo a simulated cyberattack to help policymakers decide how well the country would cope.
Hackers crack Twitter app to generate spam
Third-party apps on social networking sites have been criticised in the past for security issues, with the main focus being on Facebook apps, but now the spotlight has fallen on Twitter.
Data loss concerns over online dating
Life assistance company, CPP, is warning online daters about the dangers of giving out personal information this Valentine’s day
Romantics targeted with Valentine’s Day spam
Virus protection company, PandaLabs, is warning internet users that cyber criminals will use Valentine’s Day-themed content to spread malware.
Nigerian government uses music in cybercrime fight
The Nigerian Government is working with Microsoft on a public awareness program that uses music to fight cybercrime in the country.
Mozilla admits it was wrong about Firefox add-on
The Mozilla Foundation, the open source group behind the popular Firefox web browser, has withdrawn a claim that a software developer had infected a Firefox add-on with a trojan.
Serious Fraud Office warns on social networking data harvesting
The Serious Fraud Office (SFO) has warned that Facebook and Twitter – two of the most popular social networking sites – are actively being used by criminals to harvest users’ personal financial details.
F-Secure lands international security deal with Vodafone
IT security vendor F-Secure has extended its mobile data protection deal with Vodafone, which dates from two years ago, to cover users of PCs supplied by the international communications giant.
Prolexic chase botnet cybercriminals
Network service security vendor, Prolexic, has released a report highlighting the difficulties in tracing the activities of cybercriminals using botnets.