Please turn on your JavaScript for this page to function normally.
Malicious QR codes and the persistence of rootkits

Cybercrime has come a long way since it was mostly a digital form of vandalism. It has developed into a criminal business operated for financial gain and is now worth …

Endpoint security through whitelisting

The latest release of McAfee Application Control is integrated with McAfee Global Threat Intelligence to show the file reputation of every file in the enterprise. This feature …

Computer Security Fundamentals, 2nd Edition

This book brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. It …

Organizations to replace BI functions with cloud offerings

Nearly one third of organizations either already use or plan to use cloud or software-as-a-service (SaaS) offerings to augment their core business intelligence (BI) functions, …

Critical flaws in Symantec’s pcAnywhere patched

After having been notified by Symantec about the theft of the software’s old source code and the increased security risk that incident entails for them, users of the …

“Chuck Norris is dead” Facebook scam

Chuck Norris, the popular martial artist/ actor whose “tough guy” image has spawned a countless jokes and memes on the Internet, has been killed off by Facebook …

“Frankenmalware” active in the wild

If you’re not careful and you don’t use anti-malware software, you might end up with various viruses, Trojans and worms on your computer. But, according to …

Rogue apps make comeback in “Hours spent on Facebook” scam

Rogue Facebook applications were at one point in time extremely popular with scammers, but users getting wise regarding that approach have made the crooks steer clear of them …

Searching for Google Chrome can lead to malicious content

Searching for a link to download Google Chrome might result in a malware infection, warns a Websense researcher. According to him, if a user enters the term “Download …

Carberp Trojan targets French broadband subscribers

Last year, Carberp emerged on the online banking fraud scene as a competitor to the dominant financial malware platforms Zeus and SpyEye. Trusteer recently discovered a …

Securely upload data to the AWS cloud

Amazon announced AWS Storage Gateway, a service that provides a new option to securely upload data to the AWS cloud. The AWS Storage Gateway connects an on-premises software …

Targeted attacks will change the economics of security

Today, European Justice Commissioner, Viviane Reding, will unveil the new European Privacy Directive, designed to safeguard personal, identifiable information that is stored …

Don't miss

Cybersecurity news