Apr 14

After a few bitter security threats faced by the company last year, Google has learnt some big security lessons to protect its systems. Late last year, Google faced hack attacks which shattered the very base of the company. Continue reading »

Tagged with:
Mar 30

A new open source device has recently been launched in the market by the Security researchers this Friday on the 26th March. The device (Keykeriki v.2) captures the traffic of a huge range of wireless systems such as remote controls, medical devices and keyboards. Continue reading »

Tagged with:
Mar 26

According to an IT support issue published just the previous week, it is believed that Mozilla is on the process of developing a tool for giving all the users of its rival browsers an easy way to find if the important add-ons are updated or not. The tool will allow the users of Internet Explorer, Chrome, Opera and Safari to check out if its add-ons are updated to their latest versions. Continue reading »

Tagged with:
Mar 24

In an advisory, Core Security Technologies alleged on Tuesday that all companies using the virtualization software were susceptible to attacks due to a possible weakness in the Microsoft’s virtual pc. The weakness was discovered by an exploit writer working at Core Security and later reported it in August 2009 to Microsoft. Continue reading »

Tagged with:
Mar 23

Based on their recent study, Unisys, a solution provider predicted that all organizations across the world will soon take on a new approach regarding their security. Unisys predicted that by end of 2010, most organizations will implement new security methods for verifying the identity of its users in order to protect all the confidential information. Leading the charge for high security will be a wide range of financial institutions and defense agencies. Here below are the four different ways that Unisys sees most of the organizations securing their hatches in the New Year. Continue reading »

Tagged with:
preload preload preload