ALL POSTS DDOS, the doorbell ditch of cybercrime Adam Kujawa July 1, 2013 0 Comments This morning, Michael Callahan of Juniper Networks posted an article on SecurityWeek.com about distributed denial of service, or DDOS, called “Take… Revisiting Geolocation Metadata In Our Toys Jean Taggart June 28, 2013 0 Comments Metadata is data about data, imbedded in that data.Confused yet? Files can have information about themselves, contained within them. It can… Fake Opera Browser Update Distributes Ransomware Jérôme Segura June 27, 2013 0 Comments Opera Software, the Norwegian company that makes the Opera browser was hacked on June 19th and released a statement a week… First Official Xbox One Emulator Is a Phony Joshua Cannell June 26, 2013 0 Comments Gamer or not, you’ve likely heard about the next generation of video game consoles arriving later this year. However, you probably… Privacy in the Cloud: Google Lawsuits, Facebook Data Breach, NSA Leaks Jérôme Segura June 25, 2013 0 Comments Over the years, online privacy has not been spared very much with from Adware and Spyware that monitor your browsing habits… Electronic License Plates: A Better Alternative? Joshua Cannell June 24, 2013 0 Comments The electronic plate can receive updates with messages from the DMV, including if the car is stolen. The state of South… Is Google Acknowledging Android Is Not Secure? Hmm… Armando Orozco June 18, 2013 0 Comments Android has been in the news a lot recently, many times not for the reason’s Google would like, but malware has… A Guide to Website Security Jérôme Segura June 17, 2013 0 Comments Having your own website is hard enough. In addition to adding content, trying to grow your audience, maintaining it, now you… Patching the End User: How to Recognize the Social Engineering In Scams Jean Taggart June 11, 2013 0 Comments Scammers use psychological manipulation to defraud their victims, so it is extremely useful to be able to identify the social engineering elements… Previous 1 … 605 606 607 608 609 … 619 Next Contributors Threat Center Podcast Glossary Scams