Please turn on your JavaScript for this page to function normally.
Large mailing of PDF files exploits recent vulnerability

F-Secure has been monitoring a large mailing of malicious PDF files. These PDF files exploit a recent vulnerability. When such PDF files are viewed on vulnerable machines, …

Block Data Leakage at the Source

Computer networks today have become increasingly open, with greater reliance on IP. More and more staff are accessing a greater number of applications and databases, while …

Windows Mobile 6 storage card encryption solution

Sprite Mobile announced the launch of Sprite Backup 6.1, the newest edition of the award winning Microsoft Windows Mobile backup and recovery software. Sprite Backup 6.1 adds …

France, Spain and the USA have the highest rates of infected computers

France has been the country with the highest percentage of infected PCs this week, according to data from the Infected or Not website. Over 38% of protected computers (with an …

Data leak prevention expert to be acquired

Trend Micro announced today a definitive agreement to acquire Provilla, Inc., a leading provider of fingerprint-based intelligent endpoint solutions for data leak prevention …

Zombie Detection System with a free zombie test

PineApp has released a free zombie test that can instantly discover whether an organization’s computer network might be an unwitting spamming machine — a …

Malicious spam on the rise, PDF spam RIP

During August 2007 Sophos identified a series of large-scale malware attacks made via spam email, with weblinks inserted into spam messages that directed recipients to …

Corporate malware on the rise

The malware analysis and detection laboratory, PandaLabs, alerts that almost 72% percent of companies with more than 100 computers have active malware on their …

Theft and Snooping Alarm for Your MacBook

iAlertU is a simple utility that turns your MacBook into a motion sensitive remote controlled alarm system. I cannot think a lot of useful ways of using the software, but the …

Top spam-relaying countries – US leads the way

Sophos has published its latest report on the top twelve spam-relaying countries over the third quarter of 2007. Experts at SophosLabs scanned all spam messages received in …

Fight piracy with Automated Human Visual Verification

The Automated Human Visual Verification (AHVV) solution enables users to quickly scan thousands of potential copyright infringements each day, allowing the customers to …

A Security Focus on China Outsourcing

Business process outsourcing (BPO), such credit card transactions, medical claims data entry and financial transactions, has been around for a number of years. The act of …

Don't miss

Cybersecurity news