The Anatomy of a Vishing Scam

Saturday, March 15th, 2008

A series of well-orchestrated wireless phone-based phishing attacks against several financial institutions last week illustrates how scam artists are growing more adept at fleecing consumers by exploiting security holes in seemingly unrelated Internet technologies. The scams in this case took the form of a type of phishing known as "vishing," wherein ...

Hack into a Windows PC – no password needed

Friday, March 14th, 2008

A security consultant based in New Zealand has released a tool that can unlock Windows computers in seconds without the need for a password. Adam Boileau first demonstrated the hack, which affects Windows XP computers but has not yet been tested with Windows Vista, at a security conference in Sydney in ...

TrueCrypt 5.1 Is Out

Tuesday, March 11th, 2008

TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the ...

Hacking Backdoor in G-Archiver Found!

Tuesday, March 11th, 2008

A serious Gmail account hacking backdoor, has been found in the popular Gmail archiving software G-Archiver. This application, in all its innocence, allows you to download and backup all emails from your GMail account. But apparently the developer included the code to send an email to his email ID with ...

EU Approves Google’s DoubleClick Buy

Tuesday, March 11th, 2008

Google announced their intention to acquire ad service company DoubleClick back in April last year. Today, Reuters reports: Google won unconditional approval from the European Commission on Tuesday to buy rival Web advertiser DoubleClick for $3.1 billion, despite objections from rivals and privacy advocates. Google has already won approval from United States ...