Fake updater destroys software’s ability to auto-update
A new type of malware variants was discovered by researchers of Vietnam-based security company Bkis. The variants look like the legitimate update programs of popular software …
Lawsuit-threatening spam campaign links to malware
A bevy of emails purportedly coming from New York-based law firms Crosby & Higgins, and Marcus Law Center has been hitting inboxes around the world, CA warns. With the …
TJX hacker receives massive sentence
Albert Gonzales – the infamous “TJX hacker” – was sentenced yesterday to 20 years in prison, after being found guilty of organizing a gang of cyber …
Rogue software details: Home Personal Antivirus
Home Personal Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Rogue toolbars phish for Facebook credentials
Two rogue toolbars have been spotted in the wild by Sunbelt researchers. At first glance, they look legitimate enough. Purportedly enabling the user to cheat at popular Zynga …
Fake App Store spam leads to malware
Websense warns about a fake Apple App Store spam campaign that is doing the rounds of inboxes. The user receives an email such as this one: If the recipient follows the link …
Pwn2Own 2010: IE8, Firefox, Safari and iPhone go down
IE8, Firefox, Safari and iPhone went down in mere minutes at this year’s Pwn2Own contest held at the CanSecWest conference in Vancouver. Here is the rundown according to …
Millions continue to click on spam
Even though over 80% of email users are aware of the existence of bots, tens of millions respond to spam in ways that could leave them vulnerable to a malware infection, …
Google vs China, China vs Google
After a lengthy standstill, the situation between Google and China started developing pretty fast: two days ago, Google started redirecting users visiting Google.cn to their …
First dual biometric reader
ZK Software ntroduced the world’s first dual biometric reader. Just the touch of a finger, a one second facial scan or flash of an ID card is all it takes for the iFace …
The rise of Mafia-like cyber crime syndicates
Gone are the days when the lone hacker operated from the dark of his room in order to gain credit and respect form his peers – the hacking business has been taken over …
Symantec web security monitoring against pervasive threats
Symantec announced Web Security Monitoring, a new managed security service which monitors organizations’ proxy and gateway security devices for connections from hosts …
Featured news
Resources
Don't miss
- Healthcare CISOs must secure more than what’s regulated
- Qantas data breach could affect 6 million customers
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys