The rise of Mafia-like cyber crime syndicates
Gone are the days when the lone hacker operated from the dark of his room in order to gain credit and respect form his peers – the hacking business has been taken over …
Symantec web security monitoring against pervasive threats
Symantec announced Web Security Monitoring, a new managed security service which monitors organizations’ proxy and gateway security devices for connections from hosts …
US legislation to quash cybercrime havens
A bill was introduced to the US Senate yesterday that – if passes – will penalize economically foreign countries that choose not to or fail to put a stop to cyber …
ZeuS variant targets European banks
Major European banks and financial institutions are being targeted by the latest ZeuS/Zbot variant. UniCredit Group Subsidiary Bank of Rome; U.K.-based Abbey National; …
Turning point for security decision making
According to IBM and The Ponemon Institute research, 77 percent of C-level executives report that their organization has experienced a data breach at some point, while all …
The Conficker conundrum
Security experts estimate that Conficker, a particularly malicious worm, targeting MS Windows, has already infected more than 7 million computers around the world. Conficker …
Tax season: Identity thief’s paradise
Many consumers look forward to tax season in anticipation of a hefty return. In the same instance, many identity thieves look forward to tax season as well, only in …
Rogue software details: Coreguard Antivirus 2009
Coreguard Antivirus 2009 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Brazil tops global spam rankings
Brazil, India, Vietnam, USA and Russia head the ranking of countries from which most spam was sent during the first two months of the year, according to a study by Panda …
Best practices for web services interoperability
The Web Services Interoperability Organization (WS-I) announced the publication of the WS-I Basic Security Profile (BSP) 1.1 as final material for public access. WS-I is an …
Baby steps for Russian online security
In a move that mirrors China’s from last year, Russia’s Coordination Center will insist that anybody who applies for a .ru domain – be it an individual or a …
AVG Rescue CD: Free toolset for repair of infected machines
The AVG Rescue CD is essentially a portable version of AVG Anti-Virus supplied through Linux distribution. It can be used in the form of a bootable CD or bootable USB flash …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage