Please turn on your JavaScript for this page to function normally.
Heartland CEO calls for adoption of end-to-end encryption

Heartland made a PR move with their CEO in order to alleviate some of the anger targeted towards them because the recent breach of their security. The Heartland CEO Robert …

Removal tool for Trojan found in pirated copies of iWork ’09

SecureMac released iWorkServices Trojan Removal Tool, a free utility created to remove the iWorkServices Trojan from infected Macintosh computers running OS X. This tool is in …

Video: General Manager of IE talks about Internet Explorer 8 RC 1

Robert Vamosi sat down with Dean Hachamovitch, General Manager of IE at Microsoft. In the video below you can hear him outline what he believes are the compelling reasons to …

MythBusters to keynote RSA Conference 2009

RSA Conference, the world’s leading information security conferences and expositions, today announced that Jamie Hyneman and Adam Savage, Discovery Channel television …

Latest list of top spamming countries

Between October and December 2008, the United States relayed most of the world’s unwanted emails. China has leapt back into second place, relaying a larger proportion of …

Screenshots of a Comerica phishing attack

Comerica is a financial services company headquartered in Dallas. Today we received numerous phishing spam emails trying to snatch information and token codes of Comerica …

Symbian trojan that steals money from mobile accounts

Kaspersky Lab, a leading developer of secure content management systems, has detected a new malicious program capable of controlling a user’s mobile phone account.   …

ENISA survey on the resilience of communication networks

The European Network and Information Security Agency (ENISA) launches a report on resilience of communication networks. The survey reveals a better than expected network …

Quicktime 7.6 fixes 7 security issues

Here is the security content related to QuickTime 7.6, available for download here. CVE-ID: CVE-2009-0001 A heap buffer overflow exists in QuickTime’s handling of RTSP …

Almost 6% percent of computers infected with the Conficker worm

PandaLabs revealed that almost six percent (5.77 percent) of the two million computers they scanned showed an infection by the malicious Conficker worm. The worm, which …

Vulnerability in Cisco Security Manager

Cisco Security Manager is an enterprise-class management application that is designed to configure firewall, VPN, and intrusion prevention security services on Cisco network …

Protecting SOA Against Internal Attacks

It is critical to have a good understanding of the data flow in order to select the optimal protection approach at different points in the enterprise. By properly …

Don't miss

Cybersecurity news