• Cybersecurity Today: The Wild, Wild West

    If you purchased a brand new computer today with all the latest security software and plug it into the Internet, how long would it be before the first hacker probed it? Answer : About four hours... http://www.newsfactor.com/story.xhtml?story_id=12100CEDYE09...
  • Inside the Password-Stealing Business: The Who and How of Identity Theft

    With shopping and banking transactions occurring primarily online today, password stealing has become a common cyber crime. Whatever the vector of attack, in many cases some sort of password-stealing malware makes its way onto victims’ computers. McAfee...
  • Where in the World do Viruses come from?

    The U.S. continues to dominate as the main source of the world's viruses, producing 15.9 percent of all viruses. It is followed closely by Brazil, which produces 14.5 percent (similar levels to last month's 14.1 percent). You can see more about virus...
  • Hacking Your Life (oh oh...)

    A Virginia woman discovered that her married boyfriend had other girlfriends, and she decided to seek revenge online. According to federal prosecutors, she hired computer hackers to help. Elaine Cioni paid hackers $100 [U.S] for the password to her...
  • Microsoft SDL team releases new security tools

    The Security Development Lifecycle (SDL) team at Microsoft released two security testing tools. BinScope Binary Analyzer BinScope is a Microsoft verification tool that analyzes binaries on a project-wide level to ensure that they have been built in...