The Prime Minister’s office and the Canada’s signal intelligence agency are keeping mum on reports that the government helped American agents conduct widespread surveillance activities during the G20 summit in Toronto in 2010.
Microblogging site Twitter is combating cyber snooping by making it harder for hackers to decrypt its encrypted data even if the hackers manage to get their hands on Twitter’s private keys. Twitter said
The United States National Security Agency installed malware on more than 50,000 computer networks around the world as part of its intelligence gathering program, according to documents leaked by former NSA contractor Edward
Hewlett Packard today said it had found serious vulnerabilities in the majority of business-focused iOS mobile apps it recently conducted a series of security tests on. The vulnerabilities pose a danger to businesses
Hackers are exploiting a critical and unpatched vulnerability in Windows Office 2003, 2007 and 2010, Microsoft Corp. warned yesterday. The attackers are using a malformed image file viewed on a Web site or
Many malware programs today can be instantly altered to escape detection. To counter this some antivirus tools monitor malware behaviour, others use virtualized environments, systems monitoring or network traffic detection. Sadly, these techniques