Please turn on your JavaScript for this page to function normally.
Research shows that identity fraud is in decline

The 2008 Identity Fraud Survey Report – released by Javelin Strategy & Research – confirms that identity fraud is declining in most parts of the United …

Spybot Search & Destroy

Spybot Search & Destroy is one of the most used standalone solutions for protecting against different malware threats. This is a review of version 1.5.2 that was released in …

Report: Web browsers under siege from organised crime

IBM today released the findings of the 2007 X-Force Security report, detailing a disturbing rise in the sophistication of attacks by criminals on Web browsers worldwide. …

The Need for a New Security Approach

Historically the goal of security for most companies was nice and simple: keep the bad guys out. And it was easy to classify who the bad guys were. The bad guys were everyone …

Apple released security update 2008-001

The fresh security update addresses the following: Directory Services – A local user may be able to execute arbitrary code with system privileges. A stack buffer …

500 Gbps firewalling performance

Clavister AB, provider of IP-based security and UTM solutions, today declared a new world record in network security throughput. Tests show that the new Clavister technology …

Research reveals majority of consumers concerned over mobile safety

McAfee announced findings from new research that reveals that almost three out of four mobile consumers (72%) are concerned about the security of today’s and …

Local root exploit on openSUSE 10.2/10.3

Marcus Meissner from the SUSE security team sent the following to the opensuse-security-announce mailing list: As you are undoubtly aware a new local root exploit has been …

P2P file sharing may be 2008’s greatest identity theft threat

According to the Identity Theft Assistance Center, a national non-profit coalition dedicated to protecting consumers from identity theft, throughout 2008 “criminals will …

PCI PED equipment approval listings and security requirements

The PCI Security Standards Council announced that PCI PED equipment approval listings and security requirements documents are available on the Council’s website. With …

Undercover: Authentication Usable in Front of Prying Eyes

Abstract from the whitepaper by authors Hirokazu Sasamoto, Nicolas Christin and Eiji Hayashi: A number of recent scams and security attacks hinge on a crook’s ability to …

Google spoofing worm and other malware of the week

Percoban.A reaches computers disguised as a Word file. When run, it makes a copy of itself with names such as Rahasiamu.exe or Jangan Dibuka.exe. It also creates a Windows …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools