Please turn on your JavaScript for this page to function normally.
Rootkit Evolution

I saw my first rootkit in 2004, when I was still a rookie virus analyst. At that point I had some vague knowledge of UNIX-based rootkits. One day I stumbled on an executable …

Weekly malware report: keylogger, autorun worm and exchanger trojan

This week’s PandaLabs report looks at the Autorun.ADF worm, and the KeyLogger.E and Exchanger.AH Trojans. Autorun.ADF reaches computers in an attachment called “MY …

Browser privacy in Internet Explorer 8 Beta

With the new beta of Internet Explorer 8, Microsoft introduced InPrivate Browsing which helps prevent your browsing history, temporary Internet files, form data, cookies, and …

Researchers’ new algorithm significantly boosts routing efficiency of networks

A new algorithm developed by computer scientists at the University of California, San Diego helps answer that question, at least for computer networks, and it promises to …

Logitech video security cameras available in Europe

Logitech announced the company’s video security cameras are now available in Europe for the first time. Both PC-based security cameras feature do-it-yourself (DIY), …

New book: “High Performance MySQL, Second Edition”

The new edition of High Performance MySQL teaches advanced techniques in depth so readers can bring out MySQL’s full power. Readers can learn how to design schemas, …

SSH key-based attacks

US-CERT is aware of active attacks against Linux-based computing infrastructures using compromised SSH keys. The attack appears to initially use stolen SSH keys to gain access …

A third of IT staff snoop at confidential data

Exercise extreme caution when it comes to dismissing employees with knowledge of your IT systems. Cyber-Ark’s annual survey around “Trust, Security & …

More malware blocked in July 2008 than in the whole of 2007

In its Global Threat Report ScanSafe reported that the total number of Web-based malware blocks has increased by 87 per cent in July 2008 compared to the previous month. …

Panda Security launches its 2009 antivirus products

Panda Security has launched its 2009 range of antivirus solutions for the consumer sector. The product line-up comprises Panda Antivirus Pro 2009, Panda Internet Security 2009 …

BT enhances security monitoring service

BT announced the enhancement of its global Event Monitoring and Correlation service to further defend enterprise networks against the growing threat of malicious botnet …

Wireless DTCP content protection specification

The Digital Transmission Licensing Administrator (DTLA) has approved and published a new supplement to the Digital Transmission Content Protection (DTCP) Specification for the …

Don't miss

Cybersecurity news