Please turn on your JavaScript for this page to function normally.
Infected XP machines remain unpatched

To avoid the systems crashes from February, which were triggered by the security updates to the Windows kernel and tied to the fact that the machines were infected by the …

“Friend in need” spam campaign

Occasionally, you might receive an email like this one: Sure, there is a possibility that a friend does require your help, but it is a really small one. One of CA’s …

GFI Backup 2010 – Business Edition released

GFI Software released GFI Backup 2010 – Business Edition, suited for IT administrators who want to create a single backup/restore task and apply it across the entire …

Death of Type O Negative frontman used for Fake AV distribution

The rumor of the death of Peter Steele, Type O Negative frontman, has spread like wildfire through the Net yesterday. Confirmed by a number of sources, the unfortunate event …

New Zbot malicious campaign

A spam email purporting to come from UK’s Royal Mail service has been making the rounds of inboxes: Attached to the message is a .pdf file by the name …

Google on Fake AV

“For years, we have detected malicious content on the web and helped protect users from it,” says Niels Provos, an engineer from the company’s Security Team, …

Facebook builds up its defenses

The redesign of its Safety Center is just one of the steps Facebook is lately taking to tackle the security issues that have been steadily rising along with the number of …

Nessus 4.2.2 released

The Nessus vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and …

Little-known Java feature exploited in-the-wild

A recently unearthed feature that has been built into Java since Java 6 Update 10 allows developers to easily distribute their applications to end users. Unfortunately – …

5 ways to protect against cloud security threats

Stonesoft has identified five ways that organizations can improve cloud computing security. This announcement comes on the heels of recent research from Gartner citing that 60 …

Fireshark: Linking the malicious web

Fireshark is a tool, made up of a Firefox plugin and a set of postprocessing scripts that allows you to capture web traffic from the core of your web browser, enabling you to …

Spammers use the familiar to inspire action

Spammers have become adept at using the most familiar Internet names to give deceptive legitimacy to the billions of emails that they send. For example, between five to ten …

Don't miss

Cybersecurity news