Please turn on your JavaScript for this page to function normally.
Twitter-controlled botnet SDK at large

Huge armies of zombified computers unanimously executing the commands sent by their master – that’s what comes in the mind of a computer user at the sound of the …

Black swans, secure access and business continuity

If you’d looked through the contingency plans of the world’s top 500 companies in March of this year, it’s unlikely you’d have found a scenario that …

Real-world data on software security initiatives

Cigital announced an updated release of the “Building Security In Maturity Model” (BSIMM) study, which significantly expands the data defining benchmarks for …

OneWay: Fast FTP, SFTP uploader for Mac OS X

OneWay is a contextual FTP, SFTP uploader for Mac OS X. You can upload files directly from the Finder. Save frequently used locations in your context menu for quick access. …

Rogue software details: Live PC Care

Live PC Care is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\live pc …

One crime syndicate responsible for most phishing attacks

A single electronic crime syndicate employing advanced malware was responsible for two-thirds of all the phishing attacks detected in the second half of 2009 — and was …

Less than half of cloud services are vetted for security

More than half of U.S. organizations are adopting cloud services, but only 47 percent of respondents believe that cloud services are evaluated for security prior to …

Stealth HD Series: USB portable security devices

MXI Security introduced the new Stealth HD Series of encrypted USB hard drives. Replacing the well-known Outbacker MXP Series, the Stealth HD Series is powered by MXI …

Network admins worry about employee use of social media

According to findings a survey of 353 network administrators by Amplitude Research, four-in-ten (40%) were either “extremely concerned” (18%) or “moderately …

ENISA maps key online security actors and strategies across Europe

A study by the European Network and Information Security Agency (ENISA) provides a 750 pages-plus overview of the status of network and information security (NIS) in 30 …

Rogue software details: Data Protection

Data Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Data …

Rootkit-based Skype worm opens backdoors

While both Yahoo! Messenger and MSN Messenger have been massively exploited by IM worms, Skype users have been less exposed to this type of e-threat. It’s true that …

Don't miss

Cybersecurity news