FTC shuts down Cutwail botnet but it makes a comeback
The Cutwail botnet, one of the most notorious botnets accounting for up to 35 percent of all spam in May 2009 across the globe, experienced a major blow to its track record …
Apple releases AirPort Utility 5.4.2
AirPort Utility 5.4.2 (DMG download) is the simple to use, setup and management utility for the AirPort Express Base Station, the AirPort Extreme Base Station, and Time …
British communist party website infected by malware
Researchers at Sophos have discovered that the website of the British Communist Party has had malware planted on it by attackers, designed to infect the computers of potential …
MIS Training Institute’s annual information security survey
The MIS Training Institute’s annual information security survey was designed to identify the latest challenges, priorities, investment and management decisions faced by …
(ISC)2 urges focus on workforce development in implementing Obama’s cybersecurity plan
(ISC)2 announced its support of the recommendations to advance the federal cybersecurity workforce as outlined in the report titled, “Cyberspace Policy Review,” …
Little Snitch 2.1.4 released
Little Snitch informs you whenever a program attempts to establish an outgoing Internet connection. You can then choose to allow or deny this connection, or define a rule how …
73% of companies believe they are vulnerable to hacking
Seventy three percent of IT professionals admit their software applications are still vulnerable to hackers, only an eight percent reduction on last year’s startling …
Public beta of HouseCall 7.0 is now available
HouseCall 7.0 is a major redesign of Trend Micro’s free online virus and malware scanning service. Since its introduction in 1997, HouseCall has been scanning computers, …
Home security apps for iPhone and BlackBerry
Alarm.com launched two new native apps for iPhone and BlackBerry. Alarm.com’s new iPhone app, which runs on both iPhone and iPod touch, has been approved by Apple and is …
Your next data breach: It’s not if, it’s when
We have all seen pictures of documents stamped “Top Secret” and “Eyes Only”. We’ve seen couriers carrying documents in briefcases handcuffed to …
Enterprise risk management study
CS STARS has completed an Enterprise Risk Management (ERM) Study to gauge ERM activity. The study, done via an on-site survey of CS STARS clients, evaluates stages of progress …
10 tips to keep IT security costs down in the recession
1. Move to UTMs (unified threat management systems) UTMS save money over multiple point solutions. They can cost just a quarter of the price of multiple solutions. With UTMs …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage