Phishers Mimic Google Adwords

Saturday, May 3rd, 2008

Google Adwords account holders are being targeted by criminals out to trick them into handing over credit card information using a clever URL spoof that has gained popularity in recent weeks. On the face of it, the scam follows a traditional attack route involving the sending of spam e-mail to random ...

IronKey Unveils 8GB Version of Secure USB Drive

Friday, May 2nd, 2008

IronKey Inc., maker of the world's most secure flash drive, announced today availability of the 8GB-capacity of its IronKey secure USB devices. IronKey brings unprecedented mobile data convenience and security to individuals and organizations with its rugged, waterproof and tamper resistant USB drives that include always-on hardware encryption, strong authentication, portable ...

PHP 5.2.6 plugs security holes

Friday, May 2nd, 2008

The developers of the PHP scripting language have issued Version 5.2.6, which fixes numerous bugs and plugs some security holes. The changes are comprehensive, including bug fixes to modules that link to third-party products. PHP 5.2.6 also rectifies several flaws that could have caused a crash. The developers have eliminated errors ...

Keep Vista’s User Account Control on guard duty

Thursday, May 1st, 2008

Well, Microsoft has finally come clean about the real motivation behind Vista's User Account Control feature. As Tom Espiner's reports from the recent RSA Conference in San Francisco, Microsoft UAC Program Manager David Cross admits that UAC was designed to annoy users. Espiner quotes Cross telling the security-conference audience that negative ...

Malicious hardware may be next hacker tool

Thursday, May 1st, 2008

As if computer viruses and worms aren't enough of a nuisance, malicious hardware, which will be much more difficult to detect, could soon become a threat too. Today, computer viruses, which are programs downloaded either as an email attachment or when someone visits a website, are responsible for most computer attacks. ...