For years, security vendors have warned users to be careful about unsolicited emails. Clicking on embedded links in these emails, they say, could be dangerous, as could opening attachments that come with them. That includes emails purporting to be from couriers such as DHL and UPS, which could in fa...
Twitter was hit by what's called an "onMouseOver" attack this week that affected thousands of users. The attack exploited a security flaw in Twitter, Bob Lord, a member of the site's security team, wrote on the company's blog. Users dubbed the hole the "onMouseOver" flaw because the first attack tur...
As the 2010 Winter Olympics kick off, the games are on everyone's radar, including the cybercriminals who are looking to capitalize on this world event. Spam campaigns featuring breaking news stories filter through to in-boxes faster than ever before, as automated scripts scrape headlines and the te...
As the frequent news reports of data breaches attest, maintaining data security is a tough row to hoe -- even for large enterprises. It's even harder for small and medium-sized businesses, which don't have the money or IT resources their larger counterparts have. The plethora of threats is daunting,...
A federal court has awarded MySpace nearly $230 million in its suit against Sanford Wallace and his partner Walter Rines -- aka the "Spam King." The judgment -- especially given the size of the award -- represents a decided victory for e-commerce sites in their costly battle against spam. This is th...
Phishing is a tactic known to malicious hackers ever since the first one crawled out of a swamp and onto dry land. It's another variation on social engineering. The phisher's goal is to get people to open themselves up to technical vulnerabilities through nontechnical means. However, even though mos...
The Linux operating system is not immune to virus infections, although Linux-specific viruses are extremely rare. Linux servers face more risk of virus attack than Linux desktops. That said, IT security and control firm Sophos recently issued a warning about potential virus infections targeting Linu...
The notorious Norwegian hacker, Jon Lech Johansen -- better known as "DVD Jon" for releasing code that broke DVD copy protection in the late 1990s -- has drawn first blood with the iPhone. Johansen has posted a workaround on the Internet that allows iPhone owners to use their devices in a limited fa...
For the second time this year, hackers have victimized the University of Missouri. The names and Social Security numbers of 22,396 current or former students who were employed by UM during 2004 may have been compromised, according to university officials. The hacker or hackers reportedly gained acce...
Last month, Web-security firm MessageLabs said that for the first time ever it had recorded more e-mails bearing phishing attacks than those containing viruses or other malware. January's MessageLabs Intelligence Report also found that phishing attacks were becoming increasingly sophisticated, which...
On all accounts where it's available
Limited to critical accounts like banking and email
Only when enforced by the service provider
Plan to start using soon
Prefer not to use
What is two-factor authentication?
Enter your Username and Password to sign in.