ZeuS developers up the ante with beefed up variant
ZeuS has for a while now been almost a synonym for banking Trojans of every shape and form. Some say that the attention that the information security community has focused on …
BlackBerry patches Enterprise Server
A vulnerability in the BlackBerry Attachment Service component of the BlackBerry Enterprise Server could allow a malicious individual to cause buffer overflow errors, leading …
5 tips for protecting against spam attacks
Whether you’re at work or at home, spam causes headaches and wastes time, forcing you to trawl through your inbox to work out which mail is legitimate and which is spam. …
One in five spam messages comes from the U.S.
Sophos published the latest report into the ‘Dirty Dozen’ spam-relaying countries, covering the third quarter of 2010. Since the second quarter this year, the spam …
Android SMS Trojan variant targets Russian users
It worked for the first two times, why wouldn’t it a for third? It’s likely that the same scammers who were behind the previously discovered Android Trojan …
Photos: RSA Conference Europe 2010
RSA Conference Europe 2010 at a glance: keynotes, presentations, mingling on the expo floor.
Microsoft’s Network compromised, used to route traffic to spam websites
Microsoft has confirmed that two network devices on its network have indeed been compromised and were being used by criminals to route traffic to more than a thousand websites …
Portable device management and protection for Mac users
Cososys has released Endpoint Protector 2009, a new version of its device management, endpoint security and data loss prevention solution for Mac/Apple computers. The newly …
Dangers of wireless network use still unknown to many
Nearly half of home wi-fi networks can be hacked in less than five seconds, according to a new study. In an ‘ethical hacking’ experiment conducted across six UK …
Agentless configuration auditing
nCircle announced the new version of its Configuration Compliance Manager, an agentless configuration auditing and file integrity monitoring solution that automatically …
Amazon Seller Central vulnerable to XSS
To demonstrate that the Amazon Seller Central password reset page is vulnerable to an XSS attack, a regular submitter to the XSSed.com website has injected an iFrame tag that …
Poor password practices and how to change them
When it comes to safeguarding personal information online, many people leave their virtual keys in the front door. A survey of more than 2,500 people from the United States, …
Featured news
Resources
Don't miss
- Portmaster: Open-source application firewall
- Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)
- How a noisy ransomware intrusion exposed a long-term espionage foothold
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory