Please turn on your JavaScript for this page to function normally.
Spam and virus trends according to Google

Postini – the spam engine that powers Google’s e-mail security and archiving services – handles some 3 billion e-mails per day, so it’s fair to say …

The Zeus malware R&D program

Trusteer captured and analyzed a new version (2.1) of the Zeus financial malware and found that it has added sophisticated new mechanisms to commit online fraud and remain the …

Google Chrome 7 includes security fixes

Google Chrome 7.0.517.41 has been released to the Stable and Beta channels for Windows, Mac, and Linux. Security fixes: Possible autofill / autocomplete profile spamming. …

Protect your online privacy and identity

While consumers were very aware of the risks associated with being online and engaging in ecommerce, the majority of respondents relied on inadequate measures to protect their …

WoW players continually targeted by phishers

WoW players are continually targeted by phishers, since account credentials can be easily sold. There are many variants of phishing e-mails and in-game messages, and it pays …

Comodo Internet Security 2011 released

Comodo released its Internet Security Manager 2011 software which offers malware prevention together with central administration features. New in version 2011 are behavior …

Fake “Reported Attack Page!” warnings leading to fake AVs

Peddlers of the rogue AV solution named Security Tool have demonstrated a predilection for masquerading their solution as a Firefox update, and it’s obviously a …

Firefox 3.6.11 fixes several security issues

Mozilla released Firefox 3.6.11 that fixes several security issues as well as stability issues. Insecure Diffie-Hellman key exchange Mozilla cryptographer Nelson Bolyard …

Thief returns stolen laptop contents to owner

A surprising case of theft has been recorded in Sweden – a thief stole a laptop belonging to a university professor, but “returned” its contents to the …

10 tips for protecting against cyber espionage

SecureWorks outlines ten tips to help nations ensure that they are protected against the threat of cyber-espionage. “Since IT has become such a critical component of …

Novell Identity Manager 4 released

Novell released their Identity Manager 4 Advanced Edition which ensures consistent identity, security and compliance policies for an organization’s entire IT ecosystem. …

The rise of Java exploits

Sifting through the data collected and analyzed in order to compile the latest Microsoft Security Intelligence Report, senior program manager Holly Stewart came to an …

Don't miss

Cybersecurity news