Please turn on your JavaScript for this page to function normally.
Week in review: Phone phishing, botnet monetization, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Insufficient employee security training for the cloud Despite …

Trojan disguised as Windows Mobile game

A “trojanized” pirated version of a 3D first-person shooter game for the Windows mobile platform found its way to some Windows Mobile freeware download sites and …

The botnet economy

It is somewhat difficult for us – the potential victims – to appreciate the effectiveness of the various botnets and to aknowledge that the botnet masters have …

XBox gamers, beware!

Various fake websites that purport to be hosting a XBox Live application have been detected by Sunbelt, but are actually intent on making you download and run a password …

Prevent unauthorized electronic fund transfers

Authentify released the ETF Verifier application which enables financial applications and payment platforms to alert legitimate account owners via phone whenever a new payee …

Bank employee accused of stealing from “infected” ATMs

An employee of the Bank of America that was in charge of designing and maintaining the the bank’s computer system and its ATMs, was charged of committing computer fraud. …

Does single sign-on have a future?

Single sign-on has been for a while now lodged into many IT minds as a potential ideal solution for the issue of the forever-piling sign-in credentials. As people are …

Malicious shortened URLs on IM

Shortened URLs are not just for Twitter – their small footprint also lends itself beautifully to Instant Messaging. Unfortunately, even cybercriminals are now privy to …

Rogue software details: Your Protection

Your Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Your …

Data breaches cost Australian companies millions

Australian organizations experience costly data breaches with the average organizational cost of a data breach, including activities intended to prevent a loss of customer or …

First security cart for iPad

With the release of Apple’s iPad, schools and other organizations will be looking at e-readers in new and innovative ways. Datamation Systems introduced the first of a …

Fake AV avatars from a single file

XP Antispyware 2010, Antivirus XP 2010, XP Guardian 2010 – XP Guardian, XP Defender 2010, XP Antivirus, XP Antivirus 2010, XP Internet Security, XP Internet Security …

Don't miss

Cybersecurity news