Please turn on your JavaScript for this page to function normally.
Spoof P2P applications distribute the Lop adware

Two spoof P2P application installers, BitRoll-5.0.0.0 and Torrent101-4.5.0.0, are being used to install the Lop adware on users’ systems. These programs are used to …

Threat Spy: tracking malware across the globe

ScanSafe launched Threat Spy, the first virtual map to show the increasingly dangerous Web threat landscape. Threat Spy displays malware as it is identified and blocked by …

Automated assessment solution for Requirement 1 of the PCI DSS

RedSeal Systems released RedSeal Security Risk Manager (SRM) 3.0 which enables users to automate their assessment of Requirement 1 within the Payment Card Industry’s …

New solution to combat piracy problems

V.i. Laboratories announced a new anti-piracy strategy that gives software makers multiple options to track, reduce and recover lost revenue due to piracy. CodeArmor …

Reverse Engineering: Smashing the Signature

Many antivirus and antispyware solutions identify malicious programs by looking for known unique signatures contained inside them. Those signatures are stored inside a …

APWG and IEEE partner for Electronic Crime Research Conference

Anti-Phishing Working Group and IEEE will join forces for the development of the APWG e-Crime Researchers Summit (eCRS), the world’s only peer-reviewed technical …

Internal network security threats online encyclopedia

Promisec has released an online encyclopedia of internal network security threats. The encyclopedia, which can be viewed by anyone for free, is continually updated with …

Confidential school records made available online

Recent media reports state that more than 100,000 student records were accidentally made available online.  The security blunder by The Princeton Review, an educational …

Code signing certificates for Adobe AIR applications

VeriSign today released VeriSign Code Signing Certificates for an application on Adobe AIR. Adobe AIR is a cross-operating system runtime that enables rich Internet …

Deep packet inspection testing methodology videos and documentation

BreakingPoint Systems released a detailed test methodology and video series that enables network engineers to test the deep packet inspection (DPI) features of content-aware …

Internet Terrorist: Does Such A Thing Really Exist?

Recently, I have experienced an increase in organizations questioning how real is the threat of Internet terrorism and what they can do to protect themselves. As a former …

New version of SifoML e-mail gateway appliance

O2Security released the newest version of its email gateway appliance. SifoML v3.9 provides new features and enhancements, including the ability to prevent attacks on networks …

Don't miss

Cybersecurity news