Spam and virus trends according to Google
Postini – the spam engine that powers Google’s e-mail security and archiving services – handles some 3 billion e-mails per day, so it’s fair to say …
The Zeus malware R&D program
Trusteer captured and analyzed a new version (2.1) of the Zeus financial malware and found that it has added sophisticated new mechanisms to commit online fraud and remain the …
Google Chrome 7 includes security fixes
Google Chrome 7.0.517.41 has been released to the Stable and Beta channels for Windows, Mac, and Linux. Security fixes: Possible autofill / autocomplete profile spamming. …
Protect your online privacy and identity
While consumers were very aware of the risks associated with being online and engaging in ecommerce, the majority of respondents relied on inadequate measures to protect their …
WoW players continually targeted by phishers
WoW players are continually targeted by phishers, since account credentials can be easily sold. There are many variants of phishing e-mails and in-game messages, and it pays …
Comodo Internet Security 2011 released
Comodo released its Internet Security Manager 2011 software which offers malware prevention together with central administration features. New in version 2011 are behavior …
Fake “Reported Attack Page!” warnings leading to fake AVs
Peddlers of the rogue AV solution named Security Tool have demonstrated a predilection for masquerading their solution as a Firefox update, and it’s obviously a …
Firefox 3.6.11 fixes several security issues
Mozilla released Firefox 3.6.11 that fixes several security issues as well as stability issues. Insecure Diffie-Hellman key exchange Mozilla cryptographer Nelson Bolyard …
Thief returns stolen laptop contents to owner
A surprising case of theft has been recorded in Sweden – a thief stole a laptop belonging to a university professor, but “returned” its contents to the …
10 tips for protecting against cyber espionage
SecureWorks outlines ten tips to help nations ensure that they are protected against the threat of cyber-espionage. “Since IT has become such a critical component of …
Novell Identity Manager 4 released
Novell released their Identity Manager 4 Advanced Edition which ensures consistent identity, security and compliance policies for an organization’s entire IT ecosystem. …
The rise of Java exploits
Sifting through the data collected and analyzed in order to compile the latest Microsoft Security Intelligence Report, senior program manager Holly Stewart came to an …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility