Please turn on your JavaScript for this page to function normally.
Rogue software details: Data Protection

Data Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Data …

Rootkit-based Skype worm opens backdoors

While both Yahoo! Messenger and MSN Messenger have been massively exploited by IM worms, Skype users have been less exposed to this type of e-threat. It’s true that …

Microsoft delivers two critical updates

In today’s Patch Tuesday, Microsoft delivers two security bulletins that address vulnerabilities affecting Windows, Office and Visual Basic for Applications. …

The KHOBE attack: Are all AV solutions vulnerable?

Dubbed an “8.0 earthquake for Windows desktop security software” by its creators, the KHOBE (Kernel Hook Bypassing Engine) or the argument-switch attack has been …

Anti-Phishing Phyllis training game

Wombat Security Technologies announced the release of Anti-Phishing Phyllis, a training game to teach employees and customers how to spot fraudulent emails. In this training …

Security hole in Yelp Instant Personalization

A never-ending string of privacy glitches and bugs has struck Facebook since the implementation of its highly controversial Instant Personalization feature. This latest …

Xplico: Network forensic analysis tool

Xplico is an open source Network Forensic Analysis Tool. Its goal is to extract from an Internet traffic capture the applications data contained. From a pcap file Xplico …

New model for cloud-based security from Verizon Business

Verizon Business unveiled a new global, cloud-based SaaS portfolio that offers enterprises the ability to add security services and avoid purchasing expensive equipment. …

Schedule and modify tasks for Windows servers and workstations

Task Scheduler Pro from Lieberman Software now supports all major platforms in the Windows enterprise including Windows 7, Windows Server 2008 R2, Windows Server 2008 and …

Cloud scale data protection and security

ParaScale Cloud Storage 2.5, a cloud storage platform with features for cloud scale data security, protection and accessibility. The software includes features to efficiently …

Windows 7 Compatibility Checker turns out to be a Trojan

A deceptive “help” message invites recipients to check their PCs’ compatibility with Windows 7 by downloading and running an altered version of the Windows 7 …

Twitter gain-more-followers scam

It seems that many Twitter users are desperate for additional followers, and they are willing to take offered shortcuts to achieve that goal. Enter the bogus …

Don't miss

Cybersecurity news