Please turn on your JavaScript for this page to function normally.
F-Secure protects Android users

F-Secure released Anti-theft for Mobile and Mobile Security, which includes the Browsing Protection feature, for smartphones on the Android platform. Today’s smartphones …

Rogue software details: Security Essentials 2010

Security Essentials 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Week in review: Aurora malware, cyber war games and 0-day vulnerabilities for sale

Here’s an overview of some of last week’s most interesting news and articles: Biggest Chinese hacker training site taken down Black Hawk Safety Net, which offered …

Rogue software details: MalwarePro

MalwarePro is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Google Buzz for spammers

The Google Buzz sign-up is being advertised to users when logging into Gmail, and is a fairly transparent process to users with an existing Gmail account. Clicking on …

Critical infrastructure is a primary cybercriminal target

Critical infrastructure such as energy, pharmaceutical and government assets are more than twice as likely to be targeted by cybercriminals than other organizations, according …

Security advice for Valentine’s Day

Malware that uses Valentine’s Day as a lure to trick users and infect computers is now a well-established feature of the IT security calendar. Once again, it will be no …

Rogue software details: Security Antivirus

Security Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Will virtualization and cloud computing change how we achieve security?

The virtues of virtualization and cloud computing will figure in most enterprise IT infrastructure discussions during 2010. Virtualization has already proven its worth in …

Rogue software details: Advanced Defender

Advanced Defender is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

VNC Viewer for iPhone and iPod touch

RealVNC has launched VNC Viewer, an iPhone and iPod touch application that allows you to connect to and take full control of a computer anywhere in the world. Available to …

The four myths of cyber security

Governments and corporations around the globe are facing a crisis in the form of cyber security threats. Incidents and exploits crafted by an effective and growing menace are …

Don't miss

Cybersecurity news