Please turn on your JavaScript for this page to function normally.
Six safety tips to protect yourself from identity fraud

The 2009 Identity Fraud Survey Report by Javelin Strategy & Research offers safety tips for consumers that want to protect themselves from identity fraud. 1. Be Vigilant …

Research shows identity fraud affecting nearly ten million Americans

The 2009 Identity Fraud Survey Report – released today by Javelin Strategy & Research – confirms that the number of identity fraud victims has increased 22 …

Secure wireless router Z100G brings enterprise level protection to home wireless networks

Check Point released version 8.0 of the Check Point ZoneAlarm Secure Wireless Router Z100G. The new version includes new security features and enhancements, providing advanced …

Compliance through unified policy auditing from McAfee

McAfee announced its new Total Protection for Compliance solution which combines the power of the McAfee Vulnerability Manager appliance and the McAfee Policy Auditor software …

Comments on Digg used to distribute malware

PandaLabs has released research with evidence proving that Digg.com, the popular news aggregation service, is being used by cyber-criminals to distribute VideoPlay adware. …

Kaiser Permanente comments on employee information breach

Kaiser Permanente were recently notified that law enforcement had seized a computer file containing Kaiser Permanente Northern California employee information found in …

Latest Spam Omelette report focuses on top spam words

In week 12 of the MalwareCity.com’s Spam Omelette reports, the top spam words include: 1. UND — Ranking first in this week’s spam top, the word …

New and improved features for BitDefender Linux-based users

BitDefender has launched a new version of BitDefender Antivirus Scanner for Unices, the on-demand antivirus and antispyware scanner for Linux and FreeBSD, which is free for …

LoJack Recovery stops a major international theft ring

A lengthy investigation is coming to a close, as five people have been arrested for their work behind a major international theft ring. It all started last October when a …

First solution for auto-configuration of iPhone VPN access

Astaro users with iPhones can now automatically setup a secure, IPsec VPN tunnel with no technical knowledge required. This new process adds yet another method that iPhone …

ESET updates their Antivirus for Smartphones

ESET Mobile Antivirus delivers proactive and comprehensive protection from different type of malware as well as other unwanted software. Included with this release are the …

January 2009 Threatscape: Keylogging and spam problems, surge in exploit activity

Fortinet announced its January 2009 Threatscape report revealed a surge in exploit activity. The headline-making buffer overflow exploit to Microsoft Security Bulletin …

Don't miss

Cybersecurity news