Symantec web security monitoring against pervasive threats
Symantec announced Web Security Monitoring, a new managed security service which monitors organizations’ proxy and gateway security devices for connections from hosts …
US legislation to quash cybercrime havens
A bill was introduced to the US Senate yesterday that – if passes – will penalize economically foreign countries that choose not to or fail to put a stop to cyber …
ZeuS variant targets European banks
Major European banks and financial institutions are being targeted by the latest ZeuS/Zbot variant. UniCredit Group Subsidiary Bank of Rome; U.K.-based Abbey National; …
Turning point for security decision making
According to IBM and The Ponemon Institute research, 77 percent of C-level executives report that their organization has experienced a data breach at some point, while all …
The Conficker conundrum
Security experts estimate that Conficker, a particularly malicious worm, targeting MS Windows, has already infected more than 7 million computers around the world. Conficker …
Tax season: Identity thief’s paradise
Many consumers look forward to tax season in anticipation of a hefty return. In the same instance, many identity thieves look forward to tax season as well, only in …
Rogue software details: Coreguard Antivirus 2009
Coreguard Antivirus 2009 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Brazil tops global spam rankings
Brazil, India, Vietnam, USA and Russia head the ranking of countries from which most spam was sent during the first two months of the year, according to a study by Panda …
Best practices for web services interoperability
The Web Services Interoperability Organization (WS-I) announced the publication of the WS-I Basic Security Profile (BSP) 1.1 as final material for public access. WS-I is an …
Baby steps for Russian online security
In a move that mirrors China’s from last year, Russia’s Coordination Center will insist that anybody who applies for a .ru domain – be it an individual or a …
AVG Rescue CD: Free toolset for repair of infected machines
The AVG Rescue CD is essentially a portable version of AVG Anti-Virus supplied through Linux distribution. It can be used in the form of a bootable CD or bootable USB flash …
Cloud computing: Risks outweigh the benefits
Research conducted across Europe, the Middle East and Africa (EMEA) by ISACA has found that a quarter of enterprises that already use cloud computing believe that the risks …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring