Rogue software details: DataDoctor2010
DataDoctor2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
2010 data security trends: External attacks from the inside
Sentrigo announced its top data security trends to watch for in 2010. A new type of threat: External attacks from the inside Generally, companies have viewed attacks as either …
GnuPG 2.0.14 released
The GNU Privacy Guard (GnuPG) is GNU’s tool for secure communication and data storage. It can be used to encrypt data, create digital signatures, help authenticating …
Cyber criminals become their own ISPs
Hounded by law enforcement agencies and security experts, cyber criminals have been witnessing the ISPs and hosting providers of their botnets being shut down at a greater …
A closer look at Panda ActiveScan 2.0 – Free Antivirus
Panda’s ActiveScan is an online security solution that scans your computer for viruses, worms and Trojans, spyware and other Internet threats. It detects and eliminates …
Facebook clickjacking attack spreads
A new clickjacking attack has targeted Facebook users. It presents itself in the form of a comment on the users’ account looking like this: The photos are, obviously, …
Winter Solstice themed SEO poisoning leads to malware
Any occasion seems to be good lately to launch a SEO poisoning campaign. Zscaler reports that searching for information about the Winter Solstice (21st of December) has been …
The new cybersecurity czar is Howard Schmidt
Earlier today, on the official White House blog, it has been announced that the post of Cybersecurity Coordinator will be filled by Howard A. Schmidt, a well-known name in the …
Rogue software details: SecurityCentral
SecurityCentral is a rogue security application. In order to remove it, find out what files and registry entries to look for below. SecurityCentral will prevent execution of …
Adobe patches Flash Media Server
Critical vulnerabilities have been identified in Adobe Flash Media Server (FMS) 3.5.2 and earlier versions. The vulnerabilities could allow an attacker, who successfully …
Intel patches flaws in its Trusted Execution Technology
Invisible Things Lab – who specialize in system-level security – issued yesterday the results of their research in which they describe how flaws in Intel’s …
Tripwire’s top 5 IT security predictions for 2010
With increasingly stringent compliance mandates, the explosion in virtualization interest and adoption, demands for audit reporting, and a spike in security breaches, 2009 has …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage