Please turn on your JavaScript for this page to function normally.
File-scanning services for malware writers

A lot of people are aware of and are using online file-scanning services when they want to check if a suspicious file they got as an attachment or have found on their computer …

Privacy issues of data collecting

Will 2010 see the beginning of a change in regulations regarding net privacy? It’s hard to tell. The issue has been a matter for dispute for quite some time now, but …

GSM encryption algorithm cracked

The A5/1 privacy algorithm – more commonly known as the GSM algorithm – has been cracked and published by Karsten Nohl, a German encryption expert. He says his …

A closer look at Trend Micro Internet Security 2010

Trend Micro Internet Security detects and removes viruses, spyware, and other threats from your computer, email, instant messages, and downloads, blocks untrustworthy links in …

Insidious: How trusted employees steal millions and why it’s so hard for banks to stop them

Why do employees steal? As you will see in the book, it is a combination of motivation, opportunity and attitude. But it is all underlined by the issue of trust, which is …

Cyber criminals become their own ISPs

Hounded by law enforcement agencies and security experts, cyber criminals have been witnessing the ISPs and hosting providers of their botnets being shut down at a greater …

A closer look at Panda ActiveScan 2.0 – Free Antivirus

Panda’s ActiveScan is an online security solution that scans your computer for viruses, worms and Trojans, spyware and other Internet threats. It detects and eliminates …

Facebook clickjacking attack spreads

A new clickjacking attack has targeted Facebook users. It presents itself in the form of a comment on the users’ account looking like this: The photos are, obviously, …

Winter Solstice themed SEO poisoning leads to malware

Any occasion seems to be good lately to launch a SEO poisoning campaign. Zscaler reports that searching for information about the Winter Solstice (21st of December) has been …

The new cybersecurity czar is Howard Schmidt

Earlier today, on the official White House blog, it has been announced that the post of Cybersecurity Coordinator will be filled by Howard A. Schmidt, a well-known name in the …

A closer look at Kaspersky Anti-Virus for Mac 8.0.1.358

Kaspersky, the renowned software security company, has recently released an anti-virus solution for the Mac OS. It contains the company’s signature-based protection from …

Brittany Murphy’s death used for peddling rogue security software

It didn’t take long before cybercriminals seized the opportunity to use the death of actress Brittany Murphy to peddle malware. The most obvious choice was search engine …

Don't miss

Cybersecurity news