Please turn on your JavaScript for this page to function normally.
Five Golden Steps to Stopping the Sabotage of Sensitive Corporate Data

So it’s official then. Men are more truthful than women, and Scots are the most truthful social group in the UK. A recent research by YouGov, and commissioned by …

Critical vulnerability in Web 2.0

Fortify Software announced that its Security Research Group has documented the first major vulnerability associated specifically with Web 2.0 and AJAX-style software. Termed …

New version of ServerAssist network monitoring solution

Aldebaran Systems announced the availability of version 4.0 of their flagship product ServerAssist. ServerAssist, which has been described as the most comprehensive server …

Old-timers top malware chart

Sophos has revealed the most prevalent malware threats and email hoaxes causing problems for computer users around the world during March 2007. The figures, compiled by …

New versions of SurfControl’s neural network based dynamic categorization agent

SurfControl announced three new versions of Virtual Content Agent, a neural network based dynamic categorization agent.   Recent advances in neural network tuning and …

VeriFinger 5.0-based algorithm achieves best score

Fingerprint recognition algorithms from Neurotechnologija achieved top honors for reliability in this year’s Fingerprint Verification Competition (FVC2006). The …

IEClean and BOClean developer acquired

Comodo announced the acquisition of the assets of Privacy Software Corporation (PSC), a privately-owned company that develops security technology for the detection of malware, …

What trojans and viruses are roaming around the Net?

The virus world remains in a state of flux. In the first three months of 2007, we’ve seen three different malicious programs topping the ratings. Each month there are …

JavaScript Hijacking

An increasing number of rich Web applications, often called AJAX applications, make use of JavaScript as a data transport mechanism. This paper describes a vulnerability we …

Zero-day ANI exploit spreads via malicious web sites

F-Secure corporation warns computer users of the recently discovered Windows Animated Cursor Handling vulnerability, also known as the ANI exploit. The exploit was first …

New steals the passwords included in the AutoComplete feature of the browser

PandaLabs has informed about the new Trojan Therat.B. This malicious code is designed to steal all types of passwords. However, it also has an extremely dangerous function, …

Worm poses as Internet Explorer beta download

Sophos is warning email users of a widespread malicious attack that poses as an invitation from Microsoft to download a beta version of Internet Explorer 7.0. The emails, …

Don't miss

Cybersecurity news