French government networks breached in search for G20 files
It seems that France is the latest country whose government computer networks have been targeted by malicious individuals with likely ties to the Chinese government. The …
Security framework integrates forensics and data auditing
AccessData announced the initial release of its new integrated security framework, CIRT (Cyber Intelligence and Response Technology), and is inviting select government and …
SonicWALL releases Continuous Data Backup 6.0
SonicWALL launched CDP 6.0 which automatically preserves and protects data assets against loss from file, device, and location based disasters. With support for Windows, Linux …
The importance of metadata to prevent data leaks
A new IDC report highlights how the widespread use of collaborative content technologies is fueling the aggressive growth of unstructured and semi-structured data. While …
Risk management cookbook
The Open Group Security Forum completed a major risk management initiative with the publication of the Cookbook for ISO/IEC 27005:2005 (registration required). The cookbook is …
Week in review: Trojan on official Android market, reset Gmail accounts and backdoor Mac OS X Trojan
Here’s an overview of some of last week’s most interesting news and articles: Moldovan fraud ring mastermind arrested A coordinated effort of the Irish gardai and …
WordPress.com target of extensive DDoS attack
WordPress.com has been targeted by an extensive DDoS attack, and the millions of blogs it hosts have been temporarily unavailable or have been experiencing occasional …
The Spam King is free again, claims his spamming days are over
Robert Soloway, one of the most prolific spammers whose activities earned him the nickname Spam King, has been released from prison after a little less than 4 years inside. He …
Trojans still top malware threat
Continuing a trend observed since last summer, the same types of Trojan horse programs have persistently dominated the threat landscape through February, according to GFI …
Simple protection steps from credit card fraud
Every year, cybercriminals steal billions of dollars from unsuspecting computer users and companies by committing credit card fraud. Although this activity was once relegated …
Internet fraudsters jailed for online criminal forum
A group of young internet fraudsters who set up an online criminal forum which traded unlawfully obtained credit card details and tools to commit computer offences were jailed …
Potentially deadly Trojan is a modified security solution
An interesting tactic for hiding a Trojan has recently been spotted by Symantec researchers. Instead of using entirely their own malicious code, the malware authors have …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance