Web 2.0 News from around the Web
Researchers shed light on the dark corners of the Internet where phisher often lurk
All the security software in the world can't put malware purveyors out of business. The weak link in any computer security scheme is the gray matter positioned between the monitor and the keyboard. Use it or lose.
Attackers create fake profile to lure Twitter users to download malware. Another vulnerability allows Twitter users to force other users to automatically follow them.
Encrypt your passwords and batten down your digital hatches before reading on, as we reveal the ten most expensive digital crimes of all time
In recent months, search giant and eBay division have quietly rolled out online-payment solutions specifically targeting Internet-based campaign contributions.
Qurb 3.0 is a very close second behind our favorite spam blocker, MailFrontier, and leagues ahead of Norton AntiSpam.
Pricing not available
While installing Firefox is one of the most important steps one can take toward a safe online experience, the browser is (alas) not completely safe out of the box.