Rogue software details: Antivirus Suite
Antivirus Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
New books: Windows Server 2008, Microsoft Forefront Threat Management Gateway
Windows Server 2008 Administrator’s Pocket Consultant, Second Edition includes coverage of Windows Server 2008 R2 enhancements, including Hyper-V with Live Migration, …
Week in review: Phone phishing, botnet monetization, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Insufficient employee security training for the cloud Despite …
Trojan disguised as Windows Mobile game
A “trojanized” pirated version of a 3D first-person shooter game for the Windows mobile platform found its way to some Windows Mobile freeware download sites and …
The botnet economy
It is somewhat difficult for us – the potential victims – to appreciate the effectiveness of the various botnets and to aknowledge that the botnet masters have …
XBox gamers, beware!
Various fake websites that purport to be hosting a XBox Live application have been detected by Sunbelt, but are actually intent on making you download and run a password …
Prevent unauthorized electronic fund transfers
Authentify released the ETF Verifier application which enables financial applications and payment platforms to alert legitimate account owners via phone whenever a new payee …
Bank employee accused of stealing from “infected” ATMs
An employee of the Bank of America that was in charge of designing and maintaining the the bank’s computer system and its ATMs, was charged of committing computer fraud. …
Does single sign-on have a future?
Single sign-on has been for a while now lodged into many IT minds as a potential ideal solution for the issue of the forever-piling sign-in credentials. As people are …
Malicious shortened URLs on IM
Shortened URLs are not just for Twitter – their small footprint also lends itself beautifully to Instant Messaging. Unfortunately, even cybercriminals are now privy to …
Rogue software details: Your Protection
Your Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Your …
Data breaches cost Australian companies millions
Australian organizations experience costly data breaches with the average organizational cost of a data breach, including activities intended to prevent a loss of customer or …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage