Rogue software details: PcSecureNet
PcSecureNet is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Phishing attacks account for more than one in two viruses
More than half (55.59 per cent) of all malware sent on email is an attempted phishing attack, according to analysis of malware in January 2010 by Network Box. Phishing attacks …
Facebook users alarmed by “Unnamed” application
A cleverly orchestrated campaign taking advantage of a “Unnamed app” that can be found in the Application Settings of some people’s Facebook account has been …
iPad SEO poisoning campaign leads to malware
Was there any doubt about the fact that cybercriminals would use THE hottest topic on the Internet at the moment to spread their malicious payloads? A SEO poisoning campaign …
E-passport flaw enables owner tracking
E-passports could be used to track their owners – British computer scientists warn. The Register reports that the possibility was revealed by Tom Chothia and Vitaliy …
Information security guidelines for the healthcare industry
SecureWorks recommends the guidelines outlined below. Security risk assessments Performing regular security risk assessments will give your organization a much better …
Splunk 4.0.9 released
Splunk released version 4.0.9 of the Splunk IT search and analysis engine. The following issues have been resolved in this release: Some issues related to high memory …
EFF researches Web browser tracking
Do you ever wonder what fingerprints your browser leaves behind as you surf the web? Peter Eckersley from the EFF comments: “Traditionally, people assume they can …
IronKey delivers mobile data security to government
IronKey and Carahsoft Technology announced that Carashsoft will distribute IronKey’s managed portable storage, authentication and trusted virtual computing solutions for …
Scientology attacker to serve one-year prison sentence
A Nebraska man agreed today to plead guilty to participating in an attack on Church of Scientology websites in January 2008 that shut down the group’s websites. Brian …
The state of encryption in Europe
It is a well know fact that IT employees are a special breed. They may be seen as overly paranoid and sometimes very singleminded and demanding about the issue of security and …
Digital fingerprints to identify hackers
How can you retaliate against a cyber attacker if you don’t know who he is? As we have witnessed lately, attribution of an attack is quickly becoming one of the biggest …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations