Featured Blogs
5, 4, 3, 2, 1: Osama Bin Laden Death Scams
I suppose this was inevitable. The reported death of Osama Bin Laden is just too good a lure for cybercriminals...
Lawmakers Push To Shield Last 4 Social Security Numbers
Most of us have become accustomed to giving out the last four digits of our Social Security numbers. But this...
LizaMoon the Latest SQL-Injection Attack
Working in the security industry brings about a myriad of challenges. This is especially true for vendors. We must do...
Google Tool Cleans Up Mobile Malware ‘Dream’
Over the weekend Google released the Android Market Security Tool to help clean up devices infected with the DroidDream malware. The Android/DrdDream...
Social Security Numbers Easily Cracked
It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a...
Lost or Stolen Mobile Devices Can Lead to Identity Theft
We lose stuff. You put something down, you get distracted, you forget about it and it’s gone. Stuff falls out...
Books Fight Back
You know I always thought that at some point, printed books would go the same way as vinyl. Despite sporadic...
Data Privacy Day
This is a critical time for our personal security as it relates to privacy and personal information. A battle is...
Xirtem Worm Hides in CAB/SFX Files
W32/Xirtem@@MM is a fast-spreading and active worm, discovered in late 2008, that uses a variety of methods to propagate. The...
Hacking Wireless for Identity Theft
The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives....