Category Archives: IT Security

New worm targeting Linux PCs


A new worm is targeting personal computers running the Linux operating system, and may also pose a threat to embedded devices such as home routers and set-top boxes, a security…

What can we learn from ICS/SCADA security incidents?


Full story – http://www.net-security.org/secworld.php?id=15741 The Executive Director of ENISA Professor Udo Helmbrecht comments: “SCADA systems are often embedded in sectors that are part of a nation’s critical infrastructure, for example…

NSA spied on UN officials after cracking encryption on UN teleconferencing system


The NSA has actively spied on United Nations’ officials and personnel after managing to compromise the encryption of the organization’s internal video conferencing system, German investigative magazine Der Spiegel reported…

Researchers Develop Solar Cell With Highest Ever Efficiency


Friday, September 27, 2013:  The teams that have already established previous world record for solar cell efficiency, unveiled back in May, has made another significant development. They have announced that…

Light might prompt graphene devices on demand


ScienceDaily (Oct. 10, 2012) — Rice University researchers are doping graphene with light in a way that could lead to the more efficient design and manufacture of electronics, as well…

Android malware spies on your SMS messages – but is it part of the Zeus family? | Naked Security


Android malware spies on your SMS messages – but is it part of the Zeus family? | Naked Security.

How phone hacking worked and how to make sure you’re not a victim | Naked Security


How phone hacking worked and how to make sure you’re not a victim | Naked Security.

Viral clickjacking ‘Like’ worm hits Facebook users


For the Full Story – Sophos.com Blogs Hundreds of thousands of Facebook users have fallen for a social-engineering trick which allowed a clickjacking worm to spread quickly over Facebook this…

The curious case of Facebook’s “horrific photo”


For the Full Story – Sophos.com Blogs “This horrific photo forced photographer to kill himself!” said the messages, which spread via Facebook like wildfire at the weekend – but what…

Video: Blackhat SEO and Fake Anti-Virus – like chocolate and peanut butter


For the Full Story – Sophos.com blogs Find out how scammers are gaming Google and Bing to distribute malware attacks in ways your users may not expect. Read more and…