Please turn on your JavaScript for this page to function normally.
On the origin of spam

So you received another spam e-mail message. On the surface it seems rather ordinary. It’s an advertisement for a handful of brand-name prescription drugs. When viewed …

Rogue software details: Home Personal Antivirus

Home Personal Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Millions continue to click on spam

Even though over 80% of email users are aware of the existence of bots, tens of millions respond to spam in ways that could leave them vulnerable to a malware infection, …

First dual biometric reader

ZK Software ntroduced the world’s first dual biometric reader. Just the touch of a finger, a one second facial scan or flash of an ID card is all it takes for the iFace …

Checklist to accelerate your software security efforts

In recent years, Software-as-a-Service (SaaS) has emerged as a viable application delivery method, and most enterprises are now including some SaaS software in their …

Symantec web security monitoring against pervasive threats

Symantec announced Web Security Monitoring, a new managed security service which monitors organizations’ proxy and gateway security devices for connections from hosts …

Turning point for security decision making

According to IBM and The Ponemon Institute research, 77 percent of C-level executives report that their organization has experienced a data breach at some point, while all …

The Conficker conundrum

Security experts estimate that Conficker, a particularly malicious worm, targeting MS Windows, has already infected more than 7 million computers around the world. Conficker …

Tax season: Identity thief’s paradise

Many consumers look forward to tax season in anticipation of a hefty return. In the same instance, many identity thieves look forward to tax season as well, only in …

Rogue software details: Coreguard Antivirus 2009

Coreguard Antivirus 2009 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Brazil tops global spam rankings

Brazil, India, Vietnam, USA and Russia head the ranking of countries from which most spam was sent during the first two months of the year, according to a study by Panda …

Best practices for web services interoperability

The Web Services Interoperability Organization (WS-I) announced the publication of the WS-I Basic Security Profile (BSP) 1.1 as final material for public access. WS-I is an …

Don't miss

Cybersecurity news