Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren't mistaken for botnets, Gizmodo reports.
Archives - October 2014
iOS and Android messaging app GroupMe has had a possible vulnerability fixed quickly by Microsoft, according to The Register. There was no evidence to suggest any cybercriminals had been able to exploit the flaw before it was patched.
Two Flash vulnerabilities that were fixed by Adobe 2 weeks ago are now being used in exploit kits. This is in addition to a third vulnerability, CVE-2014-0556, that was patched in September and that has also been added to Nuclear EK last week.
A judge in Virginia has ruled that the police can require you to unlock your smartphone with a fingerprint, but not with a passcode, Mashable reports.
Learn how to update Adobe Flash Player, to help protect against malware attacks.
A carder like tool for cybercriminals that promises to use stolen credit card details in a more 'human way' to bypass fraud detection has been found on sale for as little as $180, according to The Register.
A new strain of malware that uses Gmail drafts in an invisible Internet Explorer window, has been discovered. According to Network World, the malware uses the drafts folder as "the command and control to steal data."
So far, wearable tech has been of interest mainly to fitness fiends - but a new generation of hi-tech wearables comes armed with built-in scanners, biometrics and even 'three-factor security'. Can a watch really keep secrets?
National Cyber Security Awareness Month happens every October and NCSAM 2014 has seen more events and resources than ever. This recorded webinar discusses the top topics of NCSAM 2014, from the shortage of skilled cybersecurity workers to the Internet of Things (IoT).
One of the most popular and useful security functions of mobile handsets can be turned against the owner.
IT security staff have spent the last few weeks fighting hackers in the White House, after a computer network was breached. But can we tell who was behind the attack?
Google has outlined the enhanced security credentials of the upcoming Android 5.0 - nicknamed Lollipop - in an official blog post.
ESET will be well represented in papers presented at the AVAR conference in November, but that's not the only interesting content on the agenda.
Job centers across the United Kingdom are due to get a technological makeover, courtesy of biometric and signature recognition pads, reports IT Pro Portal.
Fidelity National Financial has been contacting an "undisclosed number of individuals", notifying them that a selection of personal data may have been exposed after some of the Fortune 500 company's employees had their email accounts targeted by a phishing campaign, SC Magazine reports.
Security of open source code is a hot topic, what with Heartbleed, Shellshock, and Poodle making the news. Open source code is now widely used everywhere, from big enterprises to small businesses. This recorded webinar discusses how to keep open source tools secure,
A study by Microsoft has revealed that 42 percent of Americans face 'weekly or daily' attacks by cybercriminals trying to access their computers, Network World reports.
An exit node on the Tor network has been discovered to be slipping malware on top of downloads, according to The Register. The server, based in Russia, has been flagged as bad by The Tor Project, but this "would not prevent copycat attackers from the more than 100 exit nodes in operation."
Most internet users have faced some kind of problems with internet trolls - and a new study has thrown light on who they are. We discuss how best to deal with the online pests.
A selection of rival privacy conscious Tor routers have appeared on crowdfunding sites after the Anonabox was surprisingly pulled just days after smashing its modest funding targets.