How to Transfer Music from iTunes Library to iPod

How to Transfer Music from iTunes Library to iPod


How to Transfer Music from iTunes Library to iPod

Posted:

How to Transfer Music from iTunes Library to iPodTransferring music from iTunes library to iPod should be a fairly automatic task: plug your iPod into your computer's USB port and use the Automatic Sync function built into the iTunes program. But if you find yourself face to face with the the... Recent Article published on 3/30/2010 by John Rapp

How to Convert to an RCA Connector

Posted:

Many different ways exist to send a video signal from one device to another. These connection cables range from DVI, VGA, coaxial and HDMI. However, at times you are going to find that not all devices support the same video connections. In order... Recent Article published on 3/30/2010 by gfcosmo

How to Stream Movies on Wii

Posted:

Stream Movies on Your Nintendo Wii Console!The option is finally here: you can now watch Netflix movies and television shows on your Nintendo Wii Console! And Netflix has made it extremely easy to do so. In this article you will learn how to stream movies on Wii. Recent Article published on 3/30/2010 by agentamerica

How to Find The Owner of Any Cell Phone or Land Phone

Posted:

Ever wonder who just called your cell phone? Find out who called you. Recent Article published on 3/30/2010 by dc101

How to Choose Free iPhone Games

Posted:

Cell Phone GamesIf you're wondering when someone might upset the Apple cart, it won't be any time soon. The creation of the iPhone by Apple has brought cell phones to a whole new level. As with any other modern day technological advancement, games are a huge... Recent Article published on 3/30/2010 by echoeve

How to lock your iPhone

Posted:

iPhones are great - now, let's keep ours to ourselves.iPhones are cool - and easy to use. Now let's see how easy it is to keep them private. Recent Article published on 3/30/2010 by lizwb

How to Start a Home Based Appliance Repair Business

Posted:

DishwashersIf you are handy with a wrench and enjoy repairing broken things. Appliance repair is a good home based business to start. Not much capital is required, which makes it a very easy home based business to start up. Here are a few tips. Recent Article published on 3/30/2010 by avidreader101

How to Purchase A Quality Plain Paper Fax Machine

Posted:

plain paper fax machineIf you are looking to buy a quality plain paper fax machine, then this article is for you. If you are going to spend money on a plain paper fax machine then it is worth it to you to find a high quality one. If you do a little research you could... Recent Article published on 3/30/2010 by member1984

How to use Canon 50mm f1.8 lens

Posted:

Canon 50mm f1.8 is an inexpensive primary lens, ideal for portraits and low-lighting photography. This is usually the first non-zoom lens many Canon users buy. But as most of us are accustomed to using zoom lenses or cameras with zoom... Recent Article published on 3/30/2010 by michald

How to Choose The Best Mobile Phone These Summers

Posted:

Running on Latest Android OS 2.1Mobile phones are great to have but once you buy one you see many great ones that you just left or rather missed. It is very important for you to decide what you really want and make sure that you pick the best one out of the store. Cheap cell... Recent Article published on 3/30/2010 by gptrefback

How to Make A YouTube Account

How to Make A YouTube Account


How to Make A YouTube Account

Posted:

This article will help you setup and register a free account with YouTube.com Recent Article published on 3/30/2010 by D-Digital

How to Access Cameras Around the World From Your Home Computer

Posted:

Learn how to access video cameras around the world via the internet. Recent Article published on 3/30/2010 by D-Digital

How to Get Your Own Fax Number for Free

Posted:

FREE Email Fax ServiceWith today's technology, you don't even need a fax machine to receive a fax. All you need is an email address, and you can get your very own fax number for FREE. Recent Article published on 3/30/2010 by rorsich

How to Transfer Music from iTunes Library to iPod

Posted:

How to Transfer Music from iTunes Library to iPodTransferring music from iTunes library to iPod should be a fairly automatic task: plug your iPod into your computer's USB port and use the Automatic Sync function built into the iTunes program. But if you find yourself face to face with the the... Recent Article published on 3/30/2010 by John Rapp

How to get Call of Duty: Modern warfare 2 "stimulus package" map pack for FREE

Posted:

GET THEM FOR FREEDo you want the new CoD MW2 map pack? Don't have the cash or the points to get it? Well i know how to get them for free, not spending a dime. I just takes some of your time. Its simple and easy and should only take a few days of your free... Recent Article published on 3/30/2010 by kingofkingcobra

How to Communicate Face to Face Miles Away

Posted:

With modern technology today, we do not have to pay $100s of dollars to meet face to face. That means, if Mothers really want to continue lecturing their adult children halfway around the world, they most certainly can. This also means, the... Recent Article published on 3/30/2010 by database

How to Upload a Funny YouTube Video

Posted:

YouTube.com allows you to publish just about any form of video content onto the Web. This gives you the ability to create a funny video and post it online so anyone else with an Internet connection can view it. Although what is considered... Recent Article published on 3/30/2010 by gfcosmo

How to Get Free Gift Cards for Suring The Internet

Posted:

Surfing the internet can be a lot of fun but not very profitable. Here is how to get gift cards by surfing the web. Recent Article published on 3/30/2010 by duncan411

How to Build Your Own Site

Posted:

Build Your Own SiteWhen building your own website there are a few things to consider. If you know nothing about web design, you will need to pay someone to design it exactly the way you want. Make sure you use a reputable source so you are not wasting your money. Recent Article published on 3/30/2010 by Jermaine Steele

How to Setup A Live Webcam Chat Room

Posted:

Learn how to easily create a Live Video Webcam Chat room where friends, family and you can Video chat in private (or Public) Recent Article published on 3/30/2010 by D-Digital

Hacked Yahoo email accounts in China and Taiwan

Hacked Yahoo email accounts in China and Taiwan


Hacked Yahoo email accounts in China and Taiwan

Posted: 31 Mar 2010 11:57 AM PDT

Yahoo email accounts of several journalists and human activists have been hacked and their contents likely downloaded in what seems like an organized attack concentrated on gaining as much intelligenc...

QuickTime 7.6.6 fixes security issues

Posted: 31 Mar 2010 11:19 AM PDT

Here is the security content related to QuickTime 7.6.6, available for download here. Playing maliciously crafted audio content may lead to an unexpected application termination or arbitrary code e...

Breached companies are not entitled to anonymity

Posted: 31 Mar 2010 10:43 AM PDT

Does the recent decision by District Judge Douglas Woodlock - to unseal the identities of two companies (J.C. Penney and Wet Seal) whose customer data has been stolen by TJX hacker Albert Gonzales - ...

Cloud computing security: An insider's view

Posted: 31 Mar 2010 10:30 AM PDT

As CSO of Qualys, Randy Barr is responsible for security, risk management and business continuity planning of the QualysGuard platform. In this video Randy talks about cloud computing security from an...

Unlike popular belief, short links on Twitter aren't malicious

Posted: 31 Mar 2010 10:11 AM PDT

Twitter recently announced that it has implemented a new security system to scan all URLs posted in tweets to protect users from malicious sites. This follows a similar announcement from bit.ly in Nov...

New Linksys wireless routers

Posted: 31 Mar 2010 10:02 AM PDT

Cisco unveiled a new line of Linksys wireless routers, designed to let its core audience of tech experts and enthusiasts take their home networking experience to the next level. With the addition...

Blackhat SEO techniques

Posted: 31 Mar 2010 09:47 AM PDT

The business of using blackhat Search Engine Optimization (SEO) techniques to impregnate legitimate sites has become a huge money-spinner for cybercriminals. Every day scores of new malicious campaign...

Researcher exploits PDF file without using a vulnerability

Posted: 31 Mar 2010 08:26 AM PDT

Didier Stevens, security researcher and expert on malicious PDF files, has succeeded in creating a proof-of-concept PDF file that uses the launch action triggered by the opening of the file to execute...

Social networking risks under little control

Posted: 31 Mar 2010 08:05 AM PDT

While social media is pervasive in organizations worldwide, usage has far outpaced controls, according to the latest study conducted by Palo Alto Networks. The degree of associated risk varies dramati...

Beware targeted attacks around tax season

Posted: 31 Mar 2010 07:50 AM PDT

With the tax filing deadline less than three weeks away, we're entering the busiest time of the tax season according to the IRS. Last year, almost 95 million people e-filed their tax returns. That was...

Root issues causing software vulnerabilities

Posted: 31 Mar 2010 07:45 AM PDT

A survey on software security assurance conducted during the Security B-Sides conference shows 50% of software companies say security is "always a concern." More than half of the participants of the E...

Korea becomes world's biggest malware producer

Posted: 31 Mar 2010 07:25 AM PDT

Korea has taken over from the US as the world's largest producer of Internet viruses, according to analysis of internet threats in March by Network Box. Korea now accounts for a massive 31.1 per ce...

How to Get the Best Deal on a 30 Inch Computer Monitor

How to Get the Best Deal on a 30 Inch Computer Monitor


How to Get the Best Deal on a 30 Inch Computer Monitor

Posted:

30 Inch Computer MonitorOwning a 30 inch computer monitor is pretty nice and usually comes with a large price tag. However, there are many different places that you can look that offer great deals on 30 inch computer monitors. This article lists some steps below... Recent Article published on 3/29/2010 by iifarmerii

How to Fix Computer Errors

Posted:

Fix Computer ErrorsKnowing exactly how to fix computer errors depends on a great deal of factors. What is causing the problem? Is it a software malfunction, drivers, or hardware failure? Not to mention the possibility of spyware and other malware infecting the... Recent Article published on 3/29/2010 by Elvis De Leon

How to Increase Wireless Range with a WiFi Booster Antenna

Posted:

WiFi Booster AntennaIf you are looking for a way to increase the number of available networks you can connect to, a WiFi booster antenna may be the answer for you. A WiFi booster antenna takes your current WiFi range and "boosts" it so the range signal... Recent Article published on 3/29/2010 by iifarmerii

How to Recover Deleted Files Trash Mac

Posted:

Have you deleted an important file from your Mac OS X hard drive and then realized its importance? Is the Trash Bin empty and it does not contain the files that you recently deleted? The unexpected file deletion is something that happens with... Recent Article published on 3/29/2010 by allensood

How to fix Error 1935 in Microsoft Office

Posted:

When installing a Microsoft Office 2007 program, you may come across an error that looks like this: Error 1935. An error occurred during the installation of assembly component {big long number}. This error occurs when the Microsoft .Net... Recent Article published on 3/29/2010 by blmartin

How to import/put/edit Kodak PlaySport video with windows movie maker

Posted:

import/put/edit Kodak PlaySport video with windows movie makerKodak PLAYSPORT to windows movie maker converter is a versatile converting program to convert Kodak PLAYSPORT mov files to wmm for editing Kodak PLAYSPORT with windows movie maker. Windows movie maker can input WMV, AVI, MPG video files natively,... Recent Article published on 3/29/2010 by aizquan

How to Find Folder Icon File Document You Just Closed But Forgot Name

Posted:

Find Folder Icon File Document You Just Closed But Forgot NameHi! Have you ever created a new document or spreadsheet or ?? on your computer , saved it , closed it , forgot what name you called it, then LOST it? I hate when that happens. I used to then go through the start menu on my PC and do a search but... Recent Article published on 3/29/2010 by TurtleDog

How to Transfer Video from Cameras Using Firewire

Posted:

Digital cameras typically uses the USB output to transfer pictures or video to a computer. However, digital video cameras typically use Firewire or the IEEE 1394 Interface because digital video uses much more data for video transfer. When the... Recent Article published on 3/29/2010 by romian1

How to Highlight Words Using Highlighter Pen on Lotus Notes Mail Easy

Posted:

Highlight Words Using Highlighter Pen on Lotus Notes Mail EasyThis is real simple but it really helps to emphasize words and phrases in Excel without using bold type or italics. I like this because it causes words to stand out on your PC screen. Don't overuse this though, you'll dilute your point :-) ... Recent Article published on 3/29/2010 by TurtleDog

How to Save Data on a Computer

Posted:

Looking to save data on a computer? You've come to the right place. When producing school essay documents, architecure blue prints or music files, it's always a good idea to save computer data even if you have a new computer. You never know when... Recent Article published on 3/29/2010 by webdesignsbyapw

Miami-Dade inmates hack into strangers' phone lines

Miami-Dade inmates hack into strangers' phone lines


Miami-Dade inmates hack into strangers' phone lines

Posted:

InfoSec News: Miami-Dade inmates hack into strangers' phone lines: http://www.miamiherald.com/2010/03/28/1552713/miami-dade-inmates-collect-call.html
By David Ovalle MiamiHerald.com 03.29.10
Hacking their way into home fax lines, inmates in Miami-Dade jails are racking up tens of thousands of dollars in collect calls billed to unsuspecting citizens. [...]

Activists' E-Mails Hacked in China

Posted:

InfoSec News: Activists' E-Mails Hacked in China: http://www.nytimes.com/2010/03/31/world/asia/31china.html
By Andrew Jacobs The New York Times March 30, 2010
BEIJING -- In what appears to be a coordinated assault, the e-mail accounts of at least a dozen rights activists, academics and journalists [...]

FAA Teams With IBM On Cybersecurity

Posted:

InfoSec News: FAA Teams With IBM On Cybersecurity: http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=224200778
By J. Nicholas Hoover InformationWeek March 30, 2010
The Federal Aviation Administration has begun a research and development pilot aimed at helping the agency detect and react to hackers before [...]

Organizations Rarely Report Breaches to Law Enforcement

Posted:

InfoSec News: Organizations Rarely Report Breaches to Law Enforcement: http://www.darkreading.com/database_security/security/attacks/showArticle.jhtml?articleID=224200824
By Kelly Jackson Higgins DarkReading March 30, 2010
Most organizations hit by breaches that don't require public disclosure don't call in law enforcement -- they consider it an exposure risk, with [...]

Microsoft issues emergency patch for 10 IE holes

Posted:

InfoSec News: Microsoft issues emergency patch for 10 IE holes: http://news.cnet.com/8301-27080_3-20001428-245.html
By Elinor Mills InSecurity Complex CNet News March 30, 2010
Microsoft issued an emergency security update on Tuesday to plug 10 holes in Internet Explorer, including a critical vulnerability that has been exploited in attacks in the wild. [...]

TJX Accomplice Sentenced to 7 Years in Prison

Posted:

InfoSec News: TJX Accomplice Sentenced to 7 Years in Prison: http://www.wired.com/threatlevel/2010/03/christopher-scott-sentencing/
By Kim Zetter Threat Level Wired.com March 29, 2010
BOSTON -- A hacker who helped TJX hacker Albert Gonzalez and others gain access to corporate networks was sentenced to 7 years and one day on Monday . [...]

Cyberwar Rhetoric Is Scarier Than Threat of Foreign Attack

Posted:

InfoSec News: Cyberwar Rhetoric Is Scarier Than Threat of Foreign Attack: http://www.usnews.com/opinion/articles/2010/03/29/cyberwar-rhetoric-is-scarier-than-threat-of-foreign-attack.html
By Marcus Ranum Opinion USNews.com March 29, 2010
Marcus Ranum is an expert on security system design and chief security officer for Tenable Network Security. [...]

Problem 6: Burned Out Yet?

Posted:

InfoSec News: Problem 6: Burned Out Yet?: http://blogs.csoonline.com/1181/problem_6_burned_out_yet
By Dan Lohrmann Lohrmann on GovSpace CSO 2010-03-28
"I love my job!" Can you say that? Honestly?
Or, maybe we should take off the exclamation point and change a few words around. How about: "My job is pretty cool, and I like being a [...]

[Dataloss Weekly Summary] Week of Sunday, March 21, 2010

Posted:

InfoSec News: [Dataloss Weekly Summary] Week of Sunday, March 21, 2010: ========================================================================
Open Security Foundation - DataLossDB Weekly Summary Week of Sunday, March 21, 2010
58 Incidents Added.
======================================================================== [...]

Windows 7 Less Vulnerable Without Admin Rights

Posted:

InfoSec News: Windows 7 Less Vulnerable Without Admin Rights: http://www.darkreading.com/insiderthreat/security/app-security/showArticle.jhtml?articleID=224200601
By Thomas Claburn, InformationWeek Special to Dark Reading March 29, 2010
Taking away the administrative rights from Microsoft Windows 7 users will lessen the risk posed by 90 percent of the critical Windows 7 vulnerabilities reported to date and 100 percent of the Microsoft Office vulnerabilities reported last year.
It will also mitigate the risk of 94 percent of vulnerabilities reported in all versions of Internet Explorer in 2009 and 100 percent of the vulnerabilities reported in Internet Explorer 8 during the same time period.
Finally, it will reduce the danger posed by 64 percent of all Microsoft vulnerabilities reported last year.
These findings come from a study conducted by BeyondTrust, which perhaps unsurprisingly sells software that restricts administrative privileges. The company argues that companies need its software to protect themselves, particularly during the time between Microsoft's publication of vulnerability information and the application of Microsoft's fixes.
[...]

FISMA: A good idea whose time never came

Posted:

InfoSec News: FISMA: A good idea whose time never came: http://gcn.com/articles/2010/03/29/cybereye-032910.aspx
By William Jackson Cybereye GCN.com March 29, 2010
A funny thing happened with the Federal Information Security Management Act of 2002. Critics complain that the law has created a "culture of [...]

MS to release emergency IE fix on Tuesday

Posted:

InfoSec News: MS to release emergency IE fix on Tuesday: http://www.theregister.co.uk/2010/03/29/ie_emergency_fix/
By John Leyden The Register 29th March 2010
Microsoft has announced plans to release an out-of-sequence patch, designed to resolve a zero-day vulnerability in Internet Explorer.
A cumulative update to Internet Explorer (MS10-018) plugs a security hole in IE 6 and IE 7 exploit by hackers over recent weeks. The latest version of Microsoft's browser - IE 8 - is not vulnerable to the flaw, which Microsoft first acknowledged was a problem on 9 March.
The vulnerability involves a flaw in the iepeers.dll library involving the handling of invalid values passed to the "setAttribute()" function. Exploits create a means to drop malware onto the PCs of victims, providing they visit booby-trapped website using vulnerable version of IE, as explained in our earlier story here.
[...]

Apple delivers record monster security update

Posted:

InfoSec News: Apple delivers record monster security update: http://www.computerworld.com/s/article/9174337/Apple_delivers_record_monster_security_update?taxonomyId=17
By Gregg Keizer Computerworld March 29, 2010
Apple today patched 92 vulnerabilities, a third of them critical, in a record update to its Leopard and Snow Leopard operating systems. [...]

How to Dry a Washed Cell Phone Fast

How to Dry a Washed Cell Phone Fast


How to Dry a Washed Cell Phone Fast

Posted:

If you have teenagers in the house, or if you are just forgetful, chances are that you will occasionally fish a wet cell phone out of the washing machine. These tips have been used to not only dry a phone that went through one wash cycle... Recent Article published on 3/29/2010 by Andrea Hermitt

How to Get a Great Deal on a Sony Surround Sound System

Posted:

Sony Surround Sound SystemSony surround sound systems can tend to be a little pricey. However, there are some "hidden" deals out there that can save you some serious money. The steps below will help you uncover some of these hidden special offers on Sony... Recent Article published on 3/29/2010 by iifarmerii

How to reboot a frozen Blackberry smart phone

Posted:

Blackberry CurveFrozen Blackberry got you down? It's a common problem with a very easy fix! All Blackberries are subject to the "freeze"! Recent Article published on 3/29/2010 by The Article Author

How to Transfer Video from Cameras Using Firewire

Posted:

Digital cameras typically uses the USB output to transfer pictures or video to a computer. However, digital video cameras typically use Firewire or the IEEE 1394 Interface because digital video uses much more data for video transfer. When the... Recent Article published on 3/29/2010 by romian1

How to Sell Your Cell

Posted:

Sell Your Cell Phones.Used cell phones don't have to clutter landfills. Lots of people are looking for good deals on previously owned phone. You can sell your cell phone, make some money, and extend its usefulness indefinitely. You don't have to have a... Recent Article published on 3/29/2010 by informia

How to Program Your Samsung Universal Remote

Posted:

samsung universal remoteSo you've purchased a new samsung universal remote and now its time to make it work. Following this article will have all of your electronics working and programed in no time. Recent Article published on 3/29/2010 by member1984

How to Remove Vocals From a Song Using Audacity

Posted:

Audacity LogoThe vocals can be removed if they are exactly in the center of the mix. It depends on how the track was mixed in the studio as to how effective it is. You can't isolate the vocals. (lyrics). You can have music no vocal but you can't have vocal... Recent Article published on 3/29/2010 by vwartan

How to Take lyrics out of a song using audacity

Posted:

Audacity LogoHow to isolate the singing in a song to where there is only a beat. Recent Article published on 3/29/2010 by vwartan

How to Get Free Text Service

Posted:

Free Short Message Service!With everyone looking to save a few bucks now a days why not whittle that cellphone bill down by getting free Text short message services! This messenger service is available to everyone thanks to Google! And all it requires is your cellphone! ... Recent Article published on 3/29/2010 by rosemary112

How to Find Cheap Tvs Online

Posted:

Find out how to find cheap Tvs online including: Plasma Tvs, HDTV's, Flat Screen Tvs and other types of televisions that you may be interested in getting for a cheap and lower price. Read the article below to learn how to find cheap Tvs online. Recent Article published on 3/29/2010 by - eWriter

How to Hide Personal Email Address Found on Your Facebook Profile from Strangers

How to Hide Personal Email Address Found on Your Facebook Profile from Strangers


How to Hide Personal Email Address Found on Your Facebook Profile from Strangers

Posted:

Protect your privacy!Ever wonder of getting an (spam) email from someone you do not know? Perhaps, the person got it from your Facebook profile. Your email address can be viewed by everyone if you did not set the privacy settings to a specific option. This situation... Recent Article published on 3/29/2010 by eulariza

How to buy Boy Meets World on DVD

Posted:

Boy Meets World is a timeless keepsake!Boy Meets World was a classic show during the early to late 90s. Until recently, it has been impossible to find the show on season to purchase. You've been fortunate enough to find the right article to learn how to purchase Boy Meets World on DVD. Recent Article published on 3/29/2010 by cmcosens

How to Monetize Blogs and Websites With Text Ads

Posted:

monetize blogs and websitesText ads are placed in portions of your sites content that is highlighted underneath the text. When a visitor to your website or blog scrolls their mouse over the highlighted text, a pay per click ad will appear in a box. Each time that your... Recent Article published on 3/29/2010 by Ramblin Writer

How to Set Up a Business on Facebook

Posted:

Trying to make a business page on facebook, but not sure exactly how? Do you keep getting lost during the registration process? Not to worry! Setting up anything on Facebook is easy, but you just need to know the right facts, and that is where... Recent Article published on 3/29/2010 by jeffbeer

How to Get Repeat Web Traffic

Posted:

Get Repeat Web TrafficHere are some tips to get repeat web traffic to your web content: Recent Article published on 3/29/2010 by rd709

How to Save Data on a Computer

Posted:

Looking to save data on a computer? You've come to the right place. When producing school essay documents, architecure blue prints or music files, it's always a good idea to save computer data even if you have a new computer. You never know when... Recent Article published on 3/29/2010 by webdesignsbyapw

How to Write code in HTML

Posted:

To make a website, you will need to write code in HTML if your a beginner. It may seem like a difficult task, but just remember this is possible - even for your average beginner. Writing code in HTML can be a repetitive task, but this is what... Recent Article published on 3/29/2010 by webdesignsbyapw

How to Get a Free iTunes Code

Posted:

By a quick email to AppleCare, your card can be duplicated! Recent Article published on 3/29/2010 by ituneshacker

How to fix "unavailable" status on eHow

Posted:

eHowRecently eHow members have noticed that sometimes the articles they submitted to eHow were in "unavailable" status. What does "unavailable" mean? Here are some simple instructions to deal with the eHow "unavailable"... Recent Article published on 3/29/2010 by vwartan

How to Sell Your Cell

Posted:

Sell Your Cell Phones.Used cell phones don't have to clutter landfills. Lots of people are looking for good deals on previously owned phone. You can sell your cell phone, make some money, and extend its usefulness indefinitely. You don't have to have a... Recent Article published on 3/29/2010 by informia

A closer look at Steganos Safe

A closer look at Steganos Safe


A closer look at Steganos Safe

Posted: 30 Mar 2010 11:22 AM PDT

Steganos Safe creates a password-protected virtual safe to store your photos, music, documents, and more. It also shreds unwanted files permanently and defeats data recovery applications, deep cleans ...

Microsoft releases out-of-cycle IE security patch

Posted: 30 Mar 2010 10:34 AM PDT

Microsoft released a cumulative security update which resolves nine privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The most severe vulnerabilities...

15 years of Infosecurity Europe

Posted: 30 Mar 2010 10:15 AM PDT

In this podcast, Laura Heather, Marketing Manager for Infosecurity Europe gives an update on this year's event, which will be opening its doors on the 27th of April in Earls Court, London. Heather ...

Malware spread fueled by fear of money loss

Posted: 30 Mar 2010 09:05 AM PDT

Cyber crooks have learned long ago that potential targets respond well to scare tactics, and this the kind of social engineering approach that two recent spam campaigns detected by CA employ. The f...

SEO poisoning campaign about Moscow subway explosions

Posted: 30 Mar 2010 07:50 AM PDT

Another SEO poisoning campaign has been started by conscienceless cyber criminals - this one takes advantage of the people's interest in the news regarding the twin bombing that happened in Russia a c...

Break TrueCrypt hard drive encryption quickly

Posted: 30 Mar 2010 06:41 AM PDT

The latest version of Passware Kit Forensic has become the first commercially available software to break TrueCrypt hard drive encryption without applying a time-consuming brute-force attack. It was a...

There is no such thing as Facebok AV

Posted: 30 Mar 2010 06:08 AM PDT

A rogue application claiming to be a Facebook AV has been spreading through the Friends list of its targets. Once installed, the application spreads by taking a picture like the one below and tags it ...

What’s your SEO poison?

Posted: 30 Mar 2010 06:06 AM PDT

Search engine optimization (SEO) poisoning is an increasingly popular method of attack for cybercriminals and one that shows they are using more sophisticated techniques. In the last year, attackers h...

61% of new threats are banker Trojans

Posted: 30 Mar 2010 05:58 AM PDT

PandaLabs published its report analyzing the IT security events and incidents of the first three months of the year. The amount of new malware in circulation has continued to increase. In this fir...