Please turn on your JavaScript for this page to function normally.
UK’s own “three-strikes” anti-piracy law announced

Following the decision of the European Parliament that enables European member states to approve laws that force ISPs to disconnect individuals from the Internet, the UK is …

Facebook hit by phishing scam and banking Trojan combo

Facebook users should be on the lookout for an email threat that is posing as a message from Facebook administrators. The message contains both a phishing scam and a notorious …

Network access control system PacketFence 1.8.5 released

PacketFence is a free and open source network access control (NAC) system. PacketFence is actively maintained and has been deployed in numerous large-scale institutions over …

Ubuntu 9.10 Karmic Koala released

Released today, Ubuntu 9.10 Desktop Edition and Server Edition bring a host of new features and further position Ubuntu as a viable competitor to Windows 7. Ubuntu 9.10 …

Spear phishing scammers target Taiwan officials

TrendLabs reports that they have discovered several instances of “spear phishing”. Spear phishing is a specific type of phishing fraud that involves customizable …

Trick or treat? Attackers exploit Halloween to infect users

Panda Security has uncovered a new Halloween-related search engine optimization attack. With October 31 just around the corner, and many Internet users searching for issues …

New trends in identity theft

Identity theft is America’s fastest-growing crime. More than 70 million identities will be lost this year alone with as many as 3 million social security numbers being …

Wireshark 1.2.3 supports Windows 7 and upgrades security

Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. Wireshark 1.2.3 fixes the following vulnerability: It …

Opera 10.01 fixes severe security problems

Opera 10.01 is a recommended security and stability upgrade. Certain domain names can allow execution of arbitrary code Specially crafted domain names can cause a memory …

China raising a cyber army?

Coming as a confirmation of the assertions made in the report prepared by the Center for Strategic and International Studies, another independent report released by the …

Phishing trends according to the Anti-Phishing Working Group

The Anti-Phishing Working Group issued the results of a survey they conducted in the first half of 2009, in which they sifted through data they collected and some provided by …

Encrypted Disk Detector 1.1.0 released

Encrypted Disk Detector (EDD) is a command-line tool that checks the local physical drives on a system for TrueCrypt, PGP or Bitlocker encrypted volumes. If no disk encryption …

Don't miss

Cybersecurity news