Please turn on your JavaScript for this page to function normally.
10 steps to fortify the security of your MySQL installation

For those who wish to enhance or fortify the security of the MySQL installation the following technical 10 steps are a good start. Step 1: Run MySQL in a chroot jail Chroot …

Weekly Report on Viruses and Intruders – Oscarbot.KD worm and the Nabload.JC and Banker.EEA Trojans

Oskarbot.KD is the first malicious code to infect systems by exploiting the Microsoft MS06-040 vulnerability. According to information from PandaLabs, Oscarbot.KD searches for …

Miami man accused of creating hurricane Katrina phishing website

IT security firm, Sophos, is reminding computer users of the dangers of identity theft as a 20-year-old man is charged in relation to a phishing website which claimed to …

Popcorn.net replaces MoviePass, costs victims as much as $359.88

A new variant of an old spyware infection was discovered this morning by the Schrock Innovations research department called Popcorn.net. Popcorn.net replaces the well known …

Vulnerability of Passmark Sitekey at Bank of America reported

Sestus Data Corporation announced today the discovery of a vulnerability of the Passmark Sitekey login approach at Bank of America that could permit an attacker to remotely …

Fake BBC report spreads Berlusconi death claim and malicious trojan

IT security firm Sophos is warning users about a new Trojan horse that has been spammed out to email addresses disguised as a breaking BBC news report claiming the death of …

Panda Software launches GateDefender Integra

Panda Software presents the new Panda GateDefender Integra, an all-in-one appliance for protecting against all types of threats. It offers excellent performance, a low cost of …

Assessing Java Clients with the BeanShell

Assessing the security of Java applications, and particularly client-server applications, can be a tedious process of modifying the code, compiling, deploying, testing and …

What Should Businesses Require of Data Protection Solutions?

Data protection today is one of the most innovative and fast-moving areas of Information Technology. Data protection technology developers have, in recent years, engaged in …

DOJ Deploys AppSecInc’s vulnerability assessment technology

Application Security announced that the United States Department of Justice (DOJ) is utilizing the company’s vulnerability assessment scanner, AppDetective to reduce and …

Sensitive information can still be found on second hand disks

BT, the University of Glamorgan in Wales and Edith Cowan University in Australia today issued a report based on research to determine whether second hand computer disks that …

Worms exploit critical Microsoft security vulnerability

Sophos is warning computer users of malware that is exploiting a critical security vulnerability in Microsoft software, and urging companies to roll-out security patches as a …

Don't miss

Cybersecurity news