A worm that hit Facebook last December has resurfaced, a security researcher said today, and is now hijacking user accounts …
![](https://www.tahawultech.com/wp-content/themes/bitz-child/images/tahawultech-578x400.jpg)
A worm that hit Facebook last December has resurfaced, a security researcher said today, and is now hijacking user accounts …
Hackers have been exploiting a critical bug in Adobe Reader, the popular PDF-viewing software, for at least nine days, researchers …
What the average guy might call a con is known in the security world as social engineering. Social engineering is …
UAE authorities recently announced they had broken up an international Internet data-smuggling ring suspected of hacking into the credit network …
There have been big computer worm outbreaks before, but nothing quite like Conficker . First spotted in November, the worm …
Somebody was siphoning customer financial data from a chain of gas station/convenience stores. The perpetrator covered his tracks so well …
Granted, a degree of hyperbole might exist in the above statements but then again it is not entirely far from …
A data breach disclosed Tuesday by Heartland Payment Systems may well displace TJX Companies' January 2007 breach in the record …
Most IT security woes, from software patching to cyberespionage and cybercrime, can be traced to the devastating effects wrought by …
A common misconception concerning network security is that the enterprise network is at considerable risk from external attackers only. In …
Symantec has released its “Report on the Underground Economy” and it details an online underground economy that has matured into …
‘NoScript’ is a small application that integrates into Firefox. It blocks scripts in programming languages such as JavaScript and Java …
The FortiDB-1000B appliance is a mid-enterprise product designed to “harden” databases by detecting weaknesses in passwords, access privileges and configuration …
The threats to a corporation's security are changing so quickly that it is difficult to determine what steps are required …