Please turn on your JavaScript for this page to function normally.
Kneber botnet returns, steals sensitive government documents

The Kneber botnet is running and striking again – this time with a Christmas-themed electronic greeting card seemingly coming from The White House and targeting …

Fake Microsoft security update carries Autorun worm

An e-mail supposedly coming from Microsoft and urging the recipients to update their Windows has started making rounds yesterday: There are a lot of people out there who will …

Is Google losing its fight against spam?

Once upon a time, Google was unequivocally the best and the most popular search engine in the world. Ranking pages by how they were interconnected (linked) to other sites, …

A closer look at avast! Free Antivirus

Avast! Free Antivirus (v.5.1.864) is an anti-virus, anti-spyware software with boot-time scanning capabilities. It also incorporates anti-rootkit and strong self-protection …

Security for Microsoft Windows System Administrators

Security for Microsoft Windows System Administrators aims at teaching the reader the very basics of information security: general concepts, some cryptography, concepts and …

Adobe PDF format riddled with exploitable features

Adobe’s PDF format and standard has been known for a while now to be easily exploitable and, thus, rather insecure. In the past, attackers have taken advantage not only …

A closer look at Steganos Privacy Suite

Steganos Privacy Suite (v.12) is a suite offering most Steganos privacy and encryption products bundled up together: Safe, Portable Safe, Crypt & Hide, Password Manager, …

Android Trojan with botnet capabilities found in the wild

A new, more sophisticated Trojan for Android devices has been spotting lurking on third-party Chinese Android app markets – the first ever piece of Android malware that …

GSM cracking is all about knowledge, not money

Since the cracking of GSM encryption back in December 2009 by encryption expert Karsten Nohl, the cost of setting up an operation that includes sniffing out the calls made by …

Computer Incident Response and Product Security

As time passes, more and more companies realize the importance of having an in-house incident response team. But how to go about forming one and organizing its functioning? …

Older Facebook apps threaten your and your friends’ privacy

Facebook users that are concerned with keeping their privacy have probably become more careful with the years about adding applications to their account, since many ask access …

Man makes career out of suing e-mail spammers

There may be a lot people who thought about it, but there is one who decided to actually do it – Daniel Balsam from San Francisco quit his job and started his new …

Don't miss

Cybersecurity news