Security News? Just a few clicks away

Monthly Archives: June 2012

Security 101: June 2012

As previously announced, we continue to answer questions received from the readers of the PC.COM magazine.   Does HTTPS really improve Internet security compared to HTTP?   A simple answer to this question is Yes, HTTPS indeed improves the security compared … Continue reading

The “reset your password” frenzy used to advertise online pharmacy websites

After last week’s panic in regards to password leakage and requests to change passwords, we started to see already attempts to misuse this recommendation. There are emails pretending to come from IMDB with subjects like: – Your password is too … Continue reading

Improve your security #9: create good passwords

Learn what you need to do to improve the security of your accounts and prevent password cracking. Continue reading and eHarmony passwords leaked on the web

Following the trend started by LinkedIn two days ago, the popular music website and the dating website eHarmony have issued an alert to all customers asking them to change their password because of leaked passwords. has issued the … Continue reading

Change your LinkedIn password

It appears that some hackers got their hands on the database of passwords from LinkedIn. LinkedIn representatives have stated that they’re currently analyzing the reports. The good news is that the data dump in size of 271 MB that has been made … Continue reading

Microsoft revokes certificates used to sign the Flame trojan

Microsoft released Security Advisory 2718704 which revokes some certificated which apparently were used to sign the trojan Flame. In a blog post, Microsoft explains how they discovered that some components of the malware have been signed by certificates that allow software to appear as … Continue reading

Fake LinkedIn emails to reset your password

We see LinkedIn in the news quite often because of their recent campaigns in all the media. What the company doesn’t proudly advertise is the fact that their brand is lately often used  in various spam campaigns.  Most of these spam campaigns are … Continue reading