Cyber-Attacking Directed Towards Small Businesses
Since early June, one gang has been using a uniquely insidious type of automated attack to inject malicious code on some 20,000 to 30,000 sites, many of them small businesses that rely on the Internet to reach customers, says Wayne Huang, chief technical officer at website security firm Armorize. Many small business owners don’t realize […] Continue Reading…
Evaluating E-Mail Cloud Security from Microsoft and Google
Office 365 Vs. Google Apps: Top 10 Enterprise Concerns By Mathew J. SchwartzJune 29, 2011 04:52 PM Security remains a persistent question for potential cloud suite adopters, and with the debut of Microsoft Office 365 on Tuesday, one question from small and midsize businesses will no doubt be the cloud’s reliability and security track record, […] Continue Reading…
The Federal Bureau of Investigation seized over 40 computers and arrested two individuals to break up two separate scareware cyber-crime outfits.
Federal law enforcement agents have arrested members of two cyber-crime gangs who may have netted more than $74 million by infecting user computers with scareware and then charging for fake antivirus software. (Scareware generates pop-ups that imitate Windows System messages, and will usually advertise as a anti-virus software. They typically state that there is a […] Continue Reading…
Big Brother Camera Security Iphone App Is Watching you!
(Credit: Daniel Amitay) Apple has pulled a third-party application that was collecting user-submitted “lock-screen” passwords for what its creator: Daniel Amitay claims were research purposes. The software, dubbed “Big Brother Camera Security,” was created to serve as an alternative to Apple’s lock-screen security. Users could run it when leaving their iPhone or iPod Touch unattended, […] Continue Reading…
iPhones Tracking Your Location without Permission? Here Are Some Tools to Help…
By: Elinor Mills Want to wipe location-tracking data that’s being stored on your iPhone without your permission? There’s an app for that, but you’ve got to jailbreak your iPhone first. What is Jailbreaking? The process used to open the software of an iPhone, iTouch, or iPad, to allow the user greater access to the device […] Continue Reading…