Rogue software details: TrustFighter
TrustFighter is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
US unable to win a cyber war
The inability to deflect even a simulated cyber attack or mitigate its effects shown in the exercise that took place some six days ago at Washington’s Mandarin Oriental …
VeriSign introduces new verification service for Web sites
VeriSign debuted the VeriSign Trust Seal, an extension of their recognized online trust mark, to increase confidence, traffic and transactions for sites that do not require …
Intel admits to being targeted in January attacks
Among the 34 companies that have been targeted by “sophisticated” attacks in January was Intel. The fact was acknowledged in the company’s annual report for …
Critical vulnerability in Adobe Download Manager patched
A critical vulnerability has been identified in the Adobe Download Manager. This vulnerability (CVE-2010-0189) could potentially allow an attacker to download and install …
Secretary of Homeland Security Janet Napolitano to keynote RSA Conference 2010
RSA Conference 2010 announced that Janet Napolitano, U.S. Secretary of Homeland Security, is scheduled to deliver a keynote on Wednesday, March 3, 2010 at 3:10 PM. Secretary …
IT firm falls victim to online bank fraud, loses $100,000
The latest company to fall victim to a plundering of their account by the hands of cyber criminals is Cynxsure, an IT consultancy firm based in New Hampshire. The criminals …
Windows Live ID phishing spam
Joe Wilcox warns of what seems to be an attempt to phish his Windows Live ID and password. Here is the contents of the email purporting to come from the “Windows Live …
The need for global cooperation on cyber security
When the Internet was in its teens, it was hard to imagine it evolving as far as it has. Yesterday I was chuckling over an article from 1995 in which the author adamantly …
First certified cloud-based solution for FDCC compliance
Qualys announced its new QualysGuard FDCC module – the first certified cloud-based computing solution for FDCC compliance. The module, validated by the National …
Rapid7 NeXpose now includes Exploit Exposure
Rapid7 announced Exploit Exposure, a new technology in its vulnerability management product, Rapid7 NeXpose. Exploit Exposure provides users with deeper insight into the …
What’s a rogue and why do you need to know?
You may not be familiar with the term rogue software but there’s a very good chance that you or someone you know either has experienced it, or will in the near future. …
Featured news
Resources
Don't miss
- How the City of Toronto embeds security across governance and operations
- Hottest cybersecurity open-source tools of the month: October 2025
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI
- Sanctions won’t stop cyberattacks, but they can still “bite”
- Python Foundation rejects US government grant earmarked for security improvements