Please turn on your JavaScript for this page to function normally.
Best practices for identity theft services

With security breaches and identity theft cases frequently in the news, consumers are worried about becoming identity theft victims. Responding to this concern, dozens of …

Brain: Searching for the first PC virus in Pakistan

Here is a 10-minute video reportage about Mikko Hypponen’s trip to Lahore, Pakistan, to find the authors of the first PC virus “Brain”. This is the first …

Most sites are exposed to at least one vulnerability each day

The average website has serious vulnerabilities more than nine months of the year and data leakage has over taken cross site scripting as the most common website …

GFI MAX MailArchive released

GFI Software launched GFI MAX MailArchive, a hosted service which allows businesses to archive email messages to geographically distributed datacenters for future search, …

Cloud streamlines efficiency of identity theft

Working with cloud-based services significantly improves economies of scale – for cybercriminals too, according to Commtouch. Phishers are already benefiting from free …

Tips for healthcare organizations to improve their security profile

Based upon extensive work in both healthcare IT and information security, CDW Healthcare has identified preliminary steps for healthcare organizations focused on improving …

SANS gets ready for Amsterdam

SANS Secure Europe, one of the region’s largest infosec training events is returning to Amsterdam’s Radisson Blu Hotel from 9th-21st May with 2 weeks of technical, …

Apple iOS 4.3 fixes security issues

The iOS 4.3 update contains new features, improvements, security and bug fixes. CoreGraphics Multiple vulnerabilities existed in FreeType, the most serious of which may lead …

Restrictive e-mail policies: Hidden security risks for business

IT departments are fighting a losing battle in seeking to constrain employees’ behavior through policy alone, according to Mimecast. Findings suggest that a new approach …

March Patch Tuesday details

In the video below, Qualys CTO Wolfgang Kandek and Qualys vulnerability labs manager Amol Sarwate discusses this month’s Microsoft Patch Tuesday release.

Multiple vulnerabilities in Google Chrome

Multiple vulnerabilities have been reported in Google Chorme, according to Secunia. Some have an unknown impact while others can be exploited by malicious people bypass …

Fraud losses drop on cards, cheques and online banking

New figures show that banking industry initiatives are successfully keeping the fraudsters away from customers’ cards and bank accounts. Fraud losses on UK cards, …

Don't miss

Cybersecurity news