Please turn on your JavaScript for this page to function normally.
E-card malware scam

Red Condor issued a warning about a new e-Card spam campaign that appears to come from American Greetings’ BlueMountain.com. The email, with the subject line “You …

Threats and threat technologies in 2010

Trend Micro released a report titled “The Future of Threats and Threat Technologies”, in which they analyzed the current situation and made some predictions for …

Global IT-related risk framework

ISACA released Risk IT, the first global IT-related risk framework to provide a comprehensive view of the business risks associated with IT initiatives. Available as a free …

Top 15 most common security attacks

The latest in the Data Breach Investigations Report series by Verizon Business security experts provide a look at the 15 most common security attacks and how they typically …

Advances in surveillance, more attacks on the horizon

Slashed budgets and reduced staffing numbers delayed many security initiatives in 2009, but the vulnerabilities didn’t retreat and will only intensify in 2010, Unisys …

Microsoft releases six security bulletins

In today’s Patch Tuesday, Microsoft delivers 6 bulletins that fix vulnerabilities targeting Windows, Office and Internet Explorer. Jason Miller, Data and Security Team …

Social media a playground for cybercriminals

Cisco today issued its Annual Security Report for 2009, which highlights the impact of social media, particularly social networking, on network security and explores the …

Conficker worm to become a bigger threat in 2010

Although Microsoft offered a $250,000 reward for information leading to the identities of the cybercriminals behind Conficker, the worm continues to wreak havoc. Since its …

Free Wi-Fi network scanner for Windows

inSSIDer is a free Wi-Fi network scanner for Windows Vista and Windows XP. What’s unique about inSSIDer? Use Windows Vista and Windows XP 64-bit. Uses the Native Wi-Fi …

Corporate information security comes under attack

More than ever, information is regarded by business and corporations as a highly valuable, tangible asset. Unfortunately, this value is also recognized by sophisticated groups …

5 key security trends for the next decade

Imperva predicts five key security trends to watch for over the next ten years. 1. The industrialisation of hacking There is a clear definition of roles within the hacking …

Network security IPS with zero-day malware protection

The McAfee Full Spectrum Network Defense solution delivers day-zero malware detection, network threat behavior analysis, and application-level security. The solution includes …

Don't miss

Cybersecurity news