Please turn on your JavaScript for this page to function normally.
Price list: trojans, password stealers, spam servers

Just over a thousand dollars can buy a cyber-crook the tools needed to turn malicious action into financial profit, according to data from PandaLabs. This is thanks to a black …

The state of data security in North America

RSA announced the results of a survey commissioned by RSA entitled “The State of Data Security in North America.” Conducted by Forrester Consulting, the survey …

New web security and web filtering solutions for small businesses

GFI Software announced the release of the latest version of GFI WebMonitor for ISA Server, a solution that gives administrators comprehensive control over corporate web usage …

Designing a PCI-Compliant Log Monitoring System

Log monitoring activities are an integral part of Requirement 10 of the PCI Data Security Standard and it can be difficult to understand how the different logging portions of …

MSN worm with downloader functionality

The most important malware samples analyzed by PandaLabs this week are the MSNHorn.A and Nugache.M worms, and the Legmir.ASG Trojan. MSNHorn.A spreads through MSN Messenger by …

Guide to Online Antivirus Solutions Part 5: BitDefender Online Scanner

Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …

Video explaining Zhelatin/Storm Gang’s activities

The Zhelatin/Storm Gang has been very busy lately. Their spamming tactics have changed from sending an attachment to sending a link that directs recipients to an IP Address. …

CORE GRASP for PHP – detecting and blocking injection vulnerabilities

CORE GRASP for PHP is a web-application protection software aimed at detecting and blocking injection vulnerabilities and privacy violations. As mentioned during its …

AOL identity thief faces seven year jail sentence

Sophos is reminding computer users of the threat posed by phishers following the conviction of a 23-year-old identity thief who targeted users of AOL. Michael Dolan, formerly …

Gang of four charged in joss-stick worm case

Li Jun, Wang Lei, Zhang Shun and Lei Lei are facing charges in a people’s court in Hubei Province in connection with the creation and distribution of the Fujacks worm. …

Super Ninja Privacy Techniques for Web App Developers

If I keep my documents on Google Docs, my mail on Yahoo Mail, my bookmarks on del.icio.us, and my address book on .Mac, is there any point in talking about the privacy of my …

Hot Summer Book Giveaway – Winners announced

The lucky winners in our “Hot Summer Book Giveaway” are: 1) Lennox B. – “Security Metrics” 2) Mathew L. – “The Art of Software …

Don't miss

Cybersecurity news