Classic lies you should not let a cyber criminal use on you

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out…

Why USB drives and CDs are a security risk to your corporate network

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves…

Latest Mac malware on the rise, hides in networked printer directory

A new variant of Mac malware has been discovered and it is beginning to spread to Apple Macs…

Malware Alert! The risk of image searches on Google and Bing

When was the last time you carried out an image search on Google Images? Did you check the…

The first computer virus was designed for an Apple computer, by a 15 year old

Contrary to popular belief, the first widespread computer virus that actively spread ‘in-the-wild’ was designed to target Apple…

A history of Mac malware: The Apple of a virus developer’s eye

Apple Macs are falsely believed to be invincible and completely safe against malware threats and security breaches. But…

Manhattan Court charges creators of Gozi, the world’s most destructive financial virus

In a landmark development for the cyber security world, three cyber criminals have been charged in a Federal…

Your Apple Mac does not need computer security: Myth or not?

There is a widespread misconception in the mainstream computing market that Apple Macs are more secure than Windows…

Latest security news updates from the week gone by

India and hardware makers at loggerheads over cyber security guidelines The Indian Government wants all hardware manufacturers to…

As another Java flaw is discovered, is it time to disable Java completely?

After a massive Java 0-day vulnerability surfaced in August 2012, Oracle released an out-of-cycle update to combat the…