Infected XP machines remain unpatched
To avoid the systems crashes from February, which were triggered by the security updates to the Windows kernel and tied to the fact that the machines were infected by the …
“Friend in need” spam campaign
Occasionally, you might receive an email like this one: Sure, there is a possibility that a friend does require your help, but it is a really small one. One of CA’s …
GFI Backup 2010 – Business Edition released
GFI Software released GFI Backup 2010 – Business Edition, suited for IT administrators who want to create a single backup/restore task and apply it across the entire …
Death of Type O Negative frontman used for Fake AV distribution
The rumor of the death of Peter Steele, Type O Negative frontman, has spread like wildfire through the Net yesterday. Confirmed by a number of sources, the unfortunate event …
New Zbot malicious campaign
A spam email purporting to come from UK’s Royal Mail service has been making the rounds of inboxes: Attached to the message is a .pdf file by the name …
Google on Fake AV
“For years, we have detected malicious content on the web and helped protect users from it,” says Niels Provos, an engineer from the company’s Security Team, …
Facebook builds up its defenses
The redesign of its Safety Center is just one of the steps Facebook is lately taking to tackle the security issues that have been steadily rising along with the number of …
Nessus 4.2.2 released
The Nessus vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and …
Little-known Java feature exploited in-the-wild
A recently unearthed feature that has been built into Java since Java 6 Update 10 allows developers to easily distribute their applications to end users. Unfortunately – …
5 ways to protect against cloud security threats
Stonesoft has identified five ways that organizations can improve cloud computing security. This announcement comes on the heels of recent research from Gartner citing that 60 …
Fireshark: Linking the malicious web
Fireshark is a tool, made up of a Firefox plugin and a set of postprocessing scripts that allows you to capture web traffic from the core of your web browser, enabling you to …
Spammers use the familiar to inspire action
Spammers have become adept at using the most familiar Internet names to give deceptive legitimacy to the billions of emails that they send. For example, between five to ten …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage