Please turn on your JavaScript for this page to function normally.
Trojan hijacks often-used DLL file for stealthier approach

A new dropper Trojan has been detected by BitDefender researchers, and this one utilizes an interesting technique in order to hide from antivirus software installed on the …

Indian govt to ask Yahoo, Google to route emails through servers in India

Web mail service providers such as Google, Yahoo, and others will be asked to route all emails accessed in India through servers located in the country – even if the …

New Zeus/SpyEye makes bots function as C&C servers

The latest build of the Zeus/SpyEye malware shows a change that could very well hamper the security researchers’ ability to take down the botnets using it and to find …

Users don’t bother changing default passwords

Most people working with sensitive information want stricter security policies but rarely bother changing default, automatically generated and assigned passwords. To collect …

ISO 27001 and BS 25999-2: Why is it better to implement them together?

Lots of companies implementing ISO 27001 struggle how to implement the requirements from Annex A.14 – Business continuity management. The problem is that ISO 27001 does …

Security toolkit for online mobile applications

KOBIL Systems introduced mIDentity App Security Toolkit, which protects mobile users from security attacks. KOBIL offers two reference implementations of this toolkit: …

Akamai protects enterprises from DDoS and application security attacks

Akamai Technologies introduced Akamai Kona Site Defender, a service designed to protect the brand value of companies by shielding their web sites, applications and associated …

Novell integrates Mac device management

Novell announced the availability ZENworks 11 Support Pack 2 which includes integrated device management for Mac, and introduces a new product offering with ZENworks Full Disk …

Security platform uses virtual machine introspection

CounterTack announced three new solutions available on Event Horizon, a security platform utilizing virtual machine introspection (VMI), to help organizations identify, …

Self-selected PINs aren’t that hard to guess

Four-digit banking PINs are usually randomly assigned by banks after the issuing of credit and debit cards, but there are still some out there that let its customers choose …

Fake RIAA copyright violation notification serves malware

First spotted nearly a week ago, notifications of copyright violation supposedly sent by the Recording Industry Association of America are still hitting inboxes around the …

Apache HTTP Server 2.4 released

Celebrating its 17th anniversary with an all-time record of nearly 400 million Websites powered worldwide, the Apache Software Foundation announced version 2.4 of the Apache …

Don't miss

Cybersecurity news