Week in review: New data breach legislation, cloud hacking and the return of the Alureon rootkit
Here’s an overview of some of last week’s most interesting news and articles: Trojan simulates MS Security Essentials Alert, peddles fake AV A Trojan imitating a …
First rootkit targeting 64-bit Windows spotted in the wild
Alureon rootkit is back, and has acquired the ability to hijack computers running 64-bit versions of Microsoft Windows, proclaimed Marco Giuliani, security researcher with …
Private cloud automation platform
Quest Software released Cloud Automation Platform 7.5, its enterprise-class cloud automation and management technology. New features include: Instant cloud insight with the …
Airport Internet terminals open to infection
Maybe you’re already aware of the dangers that public terminals can present to you or your computer. About two months ago, we had the instance of a photo kiosk that was …
25% of new worms are designed to spread through USB devices
In 2010, 25 percent of new worms have been specifically designed to spread through USB storage devices connected to computers, according to PandaLabs. These types of threats …
Major fake anti-virus attack spreading
Computer users should be cautious in the wake of a widespread spam campaign designed to infect users with fake anti-virus products. If recipients open HTML files attached to …
Infected flash drive blamed for US military breach
The most significant computer systems’ breach in U.S. military history dates back to 2008, when malicious code contained in a flash drive infected a laptop of a military …
Secure wireless access points from SonicWALL
SonicWALL released two new secure wireless access points – the SonicPoint-Ni and SonicPoint-Ne. Designed for enterprises, SMBs and distributed wireless networks, the new …
iTunes/PayPal scam is due to phishing, not a bug?
A recent flurry of iTunes customers’ reports that their accounts must have been hacked and used to execute purchases via PayPal that occasionally total up to thousands …
Top 10 best practices for payment application companies
Visa announced global industry best practices for payment application vendors, integrators and resellers that implement, install or manage payment-related systems on behalf of …
U.S. visitors easy prey for online scammers
As you may already know, travelers from the 36 countries that don’t require a visa to enter the U.S. must still register online for travel authorization. And as of …
Adobe closes critical vulnerabilities in Shockwave Player
Critical vulnerabilities have been identified in Adobe Shockwave Player 11.5.7.609 and earlier versions on the Windows and Macintosh operating systems. The vulnerabilities …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation