Adobe Breach Led Anonymous To Spy on FBI

It seems the government is great at collecting data but not very good at protecting it. The FBI recently reported that the Anonymous activist hacker…

Why are Medical Records Becoming a Target for ID Thieves?

If you have no idea about medical identity theft, you would probably say that there’s nothing wrong in taking your medical records. Don’t assume that…

Block CryptoLocker Before It Installs with Comodo Endpoint Security

CryptoLocker, first spotted in September, continues to claim victims of both consumers and businesses alike. The Trojan is a form of ransomware that spreads mainly…

Watch Your Plugins: Silverlight at Risk

As if we needed it, we have more proof that the black hats never rest. An already notorious exploit kit has been “improved” as a…

Multi Factor Authentication – What It Is All About

By Benson HedgeWhen we talk of internet transactions, we have always been protecting them with passwords. But do you think passwords are a sure way…

Adobe Fixes Flash Player and Cold Fusion Vulnerabilities

Adobe has successfully found and patched critical vulnerabilities found in their programs on Windows, Mac and Linux. The popular services from the company including Flash…

New Vulnerabilities Found in D-Link Routers

A router can be a gateway to the wonders of the internet. Unfortunately, it can also be a doorway through which hackers can invade your…

Microsoft Reports Threat to Older Office Versions and Windows Vista

On Tuesday, Microsoft warned that hackers are targeting Windows Vista and MS Office versions 2003 to 2010 to exploit a vulnerability that allows them to…

Silk Road Rising: The eBay of Illegal Goods Gets a Second Life

You know the web, but do you know the “deep web”? The term “deep web” refers to web pages that are dynamically created and, therefore,…

Microsoft to Leave Windows XP Users Unprotected

If you like your operating system you can keep it. But if your OS is Windows XP you might want to think about that.We have…

X