Week in review: Facebook privacy fail, malware analysis and banking Trojans
Here’s an overview of some of last week’s most interesting news, reviews and videos: Splunk.com password leak Splunk announced on their blog that they discovered …
A possible solution for banking Trojans?
ZeuS, Spy Eye, Mariposa – these are just some of the many information-stealing Trojans out there. ZeuS is, hands down, the most prominent. Its longevity is assured by …
Majority unaware of how sensitive data is stored online
The majority of U.S. citizens are unaware of how their online data is stored and who secures it, according to a Business Software Alliance (BSA) survey. Approximately one in …
Low confidence in virtual environment security
There’s a significant gap between the speed at which companies are willing to deploy virtualization and their security readiness to address the added complexity that any …
Ubuntu 10.04 released
Ubuntu 10.04 LTS includes three years of support through free security and maintenance updates. It features extensive design work, faster boot speed, social network …
Cisco Press books in the App Store
Cisco Press launched its first iPhone/iPad networking technology Apps, for IT professionals interested in general networking, networking security, or IP Video. The new Apps …
Secure document viewing
VASCO Data Security announced a solution for secure document viewing. By integrating VASCO authentication technology with LiveCycle Rights Management ES2, enterprises can now …
Red Condor 7.1 targets scams, phishing and image-based spam
Red Condor released version 7.1 of its anti-spam software which contains content filtering enhancements, a new grey listing feature, auditing controls, and enhanced …
Symantec acquires PGP
Symantec has signed definitive agreements to acquire PGP and GuardianEdge. Symantec will buy PGP for a purchase price of approximately $300 million in cash and GuardianEdge …
European privacy concerns regarding U.S. policies
There are a lot of people in Europe who feel that governments and companies should not be able to collect information of individuals so they can use it in ways that violate …
Fake Twitter email continues to plague inboxes, leads to malware
Almost a week ago, Twitter began warning its users about fake Twitter Support emails. Since then, a couple of variants of the email have surfaced, with small differences in …
The Storm botnet strikes again
Once upon a time, the Storm botnet was responsible sending out 20 percent of all spam, but was eventually crippled by the rise of new malicious software removal tools. By the …
Featured news
Resources
Don't miss
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks
- MacOS DigitStealer malware poses as DynamicLake, targets Apple Silicon M2/M3 devices
- Is your password manager truly GDPR compliant?
- 7-Zip vulnerability is being actively exploited, NHS England warns (CVE-2025-11001)