Please turn on your JavaScript for this page to function normally.
Rogue software details: Antivirus Suite

Antivirus Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

New books: Windows Server 2008, Microsoft Forefront Threat Management Gateway

Windows Server 2008 Administrator’s Pocket Consultant, Second Edition includes coverage of Windows Server 2008 R2 enhancements, including Hyper-V with Live Migration, …

Week in review: Phone phishing, botnet monetization, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Insufficient employee security training for the cloud Despite …

Trojan disguised as Windows Mobile game

A “trojanized” pirated version of a 3D first-person shooter game for the Windows mobile platform found its way to some Windows Mobile freeware download sites and …

The botnet economy

It is somewhat difficult for us – the potential victims – to appreciate the effectiveness of the various botnets and to aknowledge that the botnet masters have …

XBox gamers, beware!

Various fake websites that purport to be hosting a XBox Live application have been detected by Sunbelt, but are actually intent on making you download and run a password …

Prevent unauthorized electronic fund transfers

Authentify released the ETF Verifier application which enables financial applications and payment platforms to alert legitimate account owners via phone whenever a new payee …

Bank employee accused of stealing from “infected” ATMs

An employee of the Bank of America that was in charge of designing and maintaining the the bank’s computer system and its ATMs, was charged of committing computer fraud. …

Does single sign-on have a future?

Single sign-on has been for a while now lodged into many IT minds as a potential ideal solution for the issue of the forever-piling sign-in credentials. As people are …

Malicious shortened URLs on IM

Shortened URLs are not just for Twitter – their small footprint also lends itself beautifully to Instant Messaging. Unfortunately, even cybercriminals are now privy to …

Rogue software details: Your Protection

Your Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Your …

Data breaches cost Australian companies millions

Australian organizations experience costly data breaches with the average organizational cost of a data breach, including activities intended to prevent a loss of customer or …

Don't miss

Cybersecurity news