Unsolicited fake CVs distributing malware
The global recession has brought a shortage of jobs, but job seekers are not the only ones who are targeted by malicious emails and scams. TrendLabs has recently spotted an …
Real-world data on software security initiatives
Cigital announced an updated release of the “Building Security In Maturity Model” (BSIMM) study, which significantly expands the data defining benchmarks for …
OneWay: Fast FTP, SFTP uploader for Mac OS X
OneWay is a contextual FTP, SFTP uploader for Mac OS X. You can upload files directly from the Finder. Save frequently used locations in your context menu for quick access. …
Rogue software details: Live PC Care
Live PC Care is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\live pc …
FacebookDigits phishing scam
Facebook users have lately been targeted lately by a clever phishing scam. The phishing website, whose looks evoke those of the social network, is trying to convince potential …
WordPress users under attack
WordPress-based websites have once again become the target of attacks. This time around, the hacked websites are hosted by various ISPs: DreamHost, GoDaddy, Media Temple and …
One crime syndicate responsible for most phishing attacks
A single electronic crime syndicate employing advanced malware was responsible for two-thirds of all the phishing attacks detected in the second half of 2009 — and was …
Less than half of cloud services are vetted for security
More than half of U.S. organizations are adopting cloud services, but only 47 percent of respondents believe that cloud services are evaluated for security prior to …
Stealth HD Series: USB portable security devices
MXI Security introduced the new Stealth HD Series of encrypted USB hard drives. Replacing the well-known Outbacker MXP Series, the Stealth HD Series is powered by MXI …
Filename-changing worm wiggling on P2P networks
Worms using P2P networks to propagate have one big problem: they are usually masquerading as software, key generators, or cracks, but have hard-coded file names, which means …
Network admins worry about employee use of social media
According to findings a survey of 353 network administrators by Amplitude Research, four-in-ten (40%) were either “extremely concerned” (18%) or “moderately …
ENISA maps key online security actors and strategies across Europe
A study by the European Network and Information Security Agency (ENISA) provides a 750 pages-plus overview of the status of network and information security (NIS) in 30 …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage