Spear phishing aimed at high-value targets increases
Spear phishing aimed at high-value targets increases The Anti-Phishing Working Group (APWG) released its Q4, 2009 Phishing Activity Trends Report, which reveals that eCrime …
USB battery charger installs Trojan
The software that shows to which extent the battery is charged through the Energizer DUO USB recharger comes bundled up with a Trojan, says US CERT. The installer file for the …
Zuckerberg hacked into journalists’ email?
The renowned Facebook co-founder has been accused three years ago of stealing the source code and the business plan for the social network from some Harvard colleagues and for …
Fake drug peddlers hijack academic websites
Legal sites are often compromised and used as a stepping stone through which the user is taken to a malicious site. The latest of this kind of schemes has seen a string of …
Week in review: Aurora prevention, RSA Conference, and Mariposa botnet takedown
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Severe IE vulnerability threatens Windows XP users News of a …
Security pros doubt their network-based security
Brocade’s “man-on-the-street” survey at this week’s RSA conference in San Francisco, revealed that 47 percent of respondents believe their network …
Photos: RSA Conference 2010 Expo, part 5
Here’s a glance at the RSA Conference 2009 expo floor. The featured companies are: Entrust, SmartSwipe, Lumension, M86 Security, BlackBerry and Blockmaster.
An alternative to a web application firewall
XyberSecure presented XyberShield, a web application security service and real-time website threat identification and determent solution. Using its proprietary behavioral …
Is there a solution to the ZeuS problem?
Zeus Trojan has for a while now become almost a synonym for banking malware. Its sneakiness and the ability of its makers to constantly change and adapt it would be admirable, …
Mac AV solution with “panic button”
“Macs are safer than PCs but that doesn’t necessarily mean that they’re more secure. Many of today’s threats are browser based and Mac users are …
Malicious files with fake digital signatures
Signing malicious files with fake signatures that at first glance seem authentic is one of the new methods used by malware writers to add an air of legitimacy to them and …
Email encryption service with virtualization support
Zix Corporation announced the next generation of the company’s Email Encryption Service. ZixGateway 4.0 is the latest generation of the company’s directory driven, …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?