29.2 C
New York

Stay tuned

Subscribe to our latest newsletter and never miss the latest news!
Our newsletter is sent once a week, every Monday.

Latest news

NSA Grade Surveillance Software Being Sold to Private Companies

Reading Time: 2 minutesThe controversy and privacy concerns over collecting big data still surrounds the national security agencies. While the NSA is...

Not So Funny: Cracked Humor Site Serves Drive By Malware

Reading Time: 2 minutesSomething funny was going on at the Cracked Humor web site recently, and many site visitors were not amused.Recently,...

PCI DATA SECURITY STANDARDS: BEYOND COMPLIANCE

Reading Time: 2 minutesThere is an epidemic of identity theft that is costing businesses and consumers millions of dollars per year. Most...

TLS Encryption with Outdated Server Software Risky

Reading Time: 1 minuteWeb servers that permit users to inject new negotiations into ongoing secure sessions may allow interlopers to inject themselves...

GitHub Attack: Strong Passwords & 2-Factor Auth Critical

Reading Time: 2 minutesGitHub, the web hosting and code repository firm, is focusing attention on the importance of strong passwords for Internet...

Time to Upgrade: Say Goodbye to 1024 bit SSL

Reading Time: 2 minutes1024 bit SSL certificates are about to be obsolete.After January 1, 2014 the 1024 bit SSL Certificate will join...

Adobe Breach Led Anonymous To Spy on FBI

Reading Time: 2 minutesIt seems the government is great at collecting data but not very good at protecting it.The FBI recently reported...

Why are Medical Records Becoming a Target for ID Thieves?

Reading Time: 2 minutesIf you have no idea about medical identity theft, you would probably say that there’s nothing wrong in taking...

Block CryptoLocker Before It Installs with Comodo Endpoint Security

CryptoLocker, first spotted in September, continues to claim victims of both consumers and businesses alike. The Trojan is a form of ransomware that spreads...

Watch Your Plugins: Silverlight at Risk

Reading Time: 1 minuteAs if we needed it, we have more proof that the black hats never rest. An already notorious exploit...

Multi Factor Authentication – What It Is All About

By Benson HedgeWhen we talk of internet transactions, we have always been protecting them with passwords. But do you think passwords are a sure...

Adobe Fixes Flash Player and Cold Fusion Vulnerabilities

Reading Time: 2 minutes Adobe has successfully found and patched critical vulnerabilities found in their programs on Windows, Mac and Linux. The...