Please turn on your JavaScript for this page to function normally.
Mass spam volumes plummeting as cybercriminals turn to pinpointed attacks

In the complex and ever-changing landscape of online crime, cybercriminals have made a fundamental shift in strategy, abandoning traditional mass spam attacks in favor of …

New book: Network Warrior, Second Edition

There are many books on network certification, this one tells you what to do once you’ve passed the exam and out in the real world. Network Warrior, Second Edition …

WordPress 3.1.4 fixes security issues

WordPress 3.1.4 is available now and is a maintenance and security update for all previous versions. This release fixes an issue that could allow a malicious Editor-level user …

Hiloti Trojan downloader infection rates triple in UK

The Hiloti generic downloader is a Trojan first seen in December 2008 has shown a dramatic increase in infection rates of PCs during June 2011. Hiloti is a generic malware …

Russia becomes world leader for malware

The volume of spam in email traffic increased 2.1 per cent in May, when compared with the previous month, making up on average 80.8 per cent of the total. A reduction of …

2011 CWE/SANS top 25 most dangerous software errors

SANS and Mitre have released the CWE/SANS Top 25 Most Dangerous Software Errors list for 2011. The list was compiled with the help of a great number of security experts from a …

45 million U.S. individuals manipulate their identities

When does a little white lie become fraud? An estimated 45 million people in the U.S. have deliberately manipulated their identities in applications for credit, cell phone …

Free anti-virus technology for Amazon EC2

AVG announced free anti-virus technology for Amazon EC2 users. The preconfigured software bundled within an Amazon Machine Image (AMI) is now available on the Amazon Web …

iOS and Android more secure than PCs?

While the most popular mobile platforms in use today were designed with security in mind, these provisions are not always sufficient to protect sensitive enterprise assets …

Gannett Government Media user information stolen

The Gannett Government Media family of websites suffered a cyber attack on resulting in unauthorized access to files containing user information. The information in those …

Encrypted voice calling for the iPhone

Cellcrypt Mobile for iPhone provides voice call encryption for commercially available off-the-shelf cell phones using government-certified security through an easy-to-use …

Security vendor applauds LulzSec attacks

In an unexpected move for a security company, SecurEnvoy today said that cyber break-ins and advanced malware incidents, such as the recent DDoS attack by LulzSec, should …

Don't miss

Cybersecurity news