7 smartphone security tips
Lookout, a mobile security startup, suggests seven tips to staying safe on your smartphone. Whether you use your smartphone for business or pleasure, securing the computer in …
A closer look at Kaspersky Anti-Virus for Mac 8.0.1.358
Kaspersky, the renowned software security company, has recently released an anti-virus solution for the Mac OS. It contains the company’s signature-based protection from …
Brittany Murphy’s death used for peddling rogue security software
It didn’t take long before cybercriminals seized the opportunity to use the death of actress Brittany Murphy to peddle malware. The most obvious choice was search engine …
Microsoft Security Update Guide
The Microsoft Security Update Guide was designed to help IT professionals better understand and use Microsoft security release information, processes, communications, and …
Looking back at malware in 2009
2009 was the year in which nobody that uses the Internet could afford not to educate him/herself about the dangers that lurk in the inbox, in Google’s search results, on …
Rogue software details: TheDefend
TheDefend is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
2010 cyberthreat forecast: Attack vectors
2009 was dominated by sophisticated malicious programs with rootkit functionality, Conficker, web attacks and botnets, SMS fraud and attacks on social networks. With the start …
New books: Windows 7, Programming #F
With Windows 7: The Definitive Guide you will learn how to squeeze every bit of power out of Windows 7 to take full advantage of its features and programs. You will learn how …
Week in review: Migrating to Windows 7, VoIP vulnerability trends and online safety guide
Here’s an overview of some of last week’s most interesting news, interviews and articles: Serious SQL flaw could have compromised millions of Rockyou.com users The …
MP3 spam rides again
It has been two years since MP3 spam was last seen in inboxes worldwide. Given the occasional resurfacing of different spam methods that (must) have shown good results in the …
Twitter compromised, DNS hijacking to blame
A couple of hours ago, Twitter web site appeared to be defaced by someone called “Iranian Cyber Army”. The situation was fixed and as it turned out, hack was a …
Advanced cloud security tools
Sun Microsystems unveiled open source cloud security capabilities and announced support for the latest security guidance from the Cloud Security Alliance. The open source …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage