Skype can be used to tie users to illegal download activity

Skype can be used to tie users to illegal download activity


Skype can be used to tie users to illegal download activity

Posted: 21 Oct 2011 06:15 AM PDT

A team of researchers has proved that it is possible to determine the IP address of a user and tie it with his Internet use, and even correlate this information to his file-sharing activity with high ...

Bloody photos of Gaddafi used as bait in malware-laden email run

Posted: 21 Oct 2011 04:26 AM PDT

As predicted, the violent death of Libyan dictator Moammar Gaddafi has been taken advantage of by cyber criminals in order to trick gore-hungry users into downloading malware: Sophos reports that...

Nasdaq attackers spied on companies

Posted: 21 Oct 2011 03:03 AM PDT

The systems of the company that operates the Nasdaq Stock Market were breached many times last year, but the actual trading platform was never compromised. A subsequent investigation into the ma...

Anonymous proxy for iPhone and iPad

Posted: 21 Oct 2011 02:34 AM PDT

NetShade makes your web presence anonymous by routing your connection through a proxy server. NetShade is a subscription service. With an account, you can use the five dedicated high-speed NetSha...

Divorce is less stressful than safeguarding confidential data

Posted: 21 Oct 2011 01:31 AM PDT

How are IT managers coping with today's threat landscape? Are they properly protected against the latest data-stealing malware? And would employees report if they compromised corporate data? To fin...

rCloud: Disaster recovery for virtual environments

Posted: 21 Oct 2011 12:28 AM PDT

Doyenz announced rCloud, a disaster recovery solution for SMBs that offers recovery for virtual environments. Purpose-built for VMware virtualized environments, rCloud can restore virtual productio...

Fraud detection and cloud security from ActivIdentity

Posted: 21 Oct 2011 12:28 AM PDT

ActivIdentity introduced 4TRESS Authentication Appliance that offers multi-layered strong authentication, fraud detection and cloud security capabilities. The appliance provides more than 15 versatile...

0 comments:

Post a Comment