Please turn on your JavaScript for this page to function normally.
Scanner identifies malware strains, could be future of AV

When it comes to spotting malware, signature-based detection, heuristics and cloud-based recognition and information sharing used by many antivirus solutions today work well …

Zeus variants are back with a vengeance

After analyzing the feedback from the company’s Smart Protection Network, Trend Micro researchers have noted an upswing in attempted Zeus / Zbot Trojan infections. After …

Google set to upgrade its SSL certs

As a fine example of proactive security, Google has announced that it will be upgrading its SSL certificates to 2048-bit keys by the end of 2013. “We will begin …

Facebook phishers target Fan Pages owners

Phishing emails claiming to come from “Facebook Security” are once again hitting users’ inboxes, and this time they are aiming for the big fish: pages that …

Google researcher reveals another Windows 0-day

Tavis Ormandy – the Google researcher known for discovering a slew of Windows, Java and Flash Player vulnerabilities and zero-days and his combative attitude regarding …

DHS employees’ info possibly compromised due to system flaw

U.S. Department of Homeland Security employees have begun receiving notifications about a vulnerability that has inadvertently made their personal information potentially …

The dangers of downloading software from unofficial sites

Because malware peddlers often bundle their malicious wares with legitimate software, downloading anything from unofficial download sites is a bit like playing Russian …

Twitter finally offers 2-factor authentication

Following a slew of high-profile compromises of accounts belonging to media outlets such as AP and satirical news site The Onion, Twitter has finally implemented two-factor …

Microsoft decrypts Skype comms to detect malicious links

The issue addresses last week by The H and their associates at heise Security of whether or not Microsoft checks links contained in encrypted Skype chat sessions and their …

Logging and Log Management

Every security practitioner should by now be aware of the overwhelming advantages of logging and perusing logs for discovering intrusions into systems. But logging and log …

Commission wants to minimize U.S. IP theft economic impact

As the long awaited first meeting between China’s new president Xi Jinping and U.S. president Barack Obama draws near, the problem of cyber espionage and theft of …

Guantanamo cuts off Wi-Fi access due to OpGTMO

The U.S. military, under whose command is the Guantanamo Bay Naval Base and the infamous prison of the same name that currently houses over 150 prisoners, has decided to shut …

Don't miss

Cybersecurity news