Cloud computing investments to increase
Investments in cloud computing solutions and services are poised to increase in the next 12 months as opportunities for IT companies and their customers come into clearer …
Remote Linux desktop for your iPad
iLIVEx is a fast, secure and fault-tolerant X11 client that turns the Apple iPad into an X terminal for Linux and Unix. It allows iPad users to connect to Unix and Linux …
E-mail infections decline as exploits propagated via social media increase
Trojans are still in the spotlight, comprising 55 percent of all new threats according to PandaLabs. Infection via email, traditionally the most popular vector for spreading …
Europe’s largest security training event
SANS London 2010 is Europe’s largest training event for information and security professionals which is celebrating its 5th anniversary this year with one of the most …
Comcast hackers sentenced to prison
Christopher Allen Lewis, a.k.a. “EBK”, and Michael Paul Nebel, a.k.a. “Slacker”, were sentenced to 18 months in prison for conspiring to disrupt …
The domination of autorun malware
The top ranking e-threat for the third quarter, with 11 percent of the total infections in the world, is Trojan.AutorunINF.Gen. This piece of malware is consistently among the …
Sasfis distibuted via fake U.S. Postal Service emails
If you have recently received an email from the United States Postal Service notifying you that a package you sent wasn’t delivered because the recipient’s address …
PayPal expands consumer protection
Beginning Nov. 1, 2010, shoppers around the world will have expanded buyer protection when they make purchases at the millions of retailers that accept PayPal. The expanded …
Google offers safe browsing alerts for network admins
In order to help network administrators keep their networks free of malicious content, Google has announced a new experimental tool: Google Safe Browsing Alerts for Network …
Stuxnet shows that cyber threats can impact entire nations
The Stuxnet worm continues to make headlines, most recently with reports that computers at an Iranian nuclear power plant have been infected, potentially giving hackers the …
HDCP encryption/decryption code released
The HDCP cipher is designed to be efficient when implemented in hardware, but it is terribly inefficient in software, primarily because it makes extensive use of bit …
UK-based gang arrested for stealing millions using ZeuS
Nineteen people were arrested yesterday in the UK and are suspected of being part of an Eastern European gang that used the ZeuS Trojan to steal online banking credentials …
Featured news
Resources
Don't miss
- 6 considerations for 2025 cybersecurity investment decisions
- BlackLock ransomware onslaught: What to expect and how to fight it
- Cybercriminals shift focus to social media as attacks reach historic highs
- The risks of autonomous AI in machine-to-machine interactions
- Balancing cloud security with performance and availability