2010 data security trends: External attacks from the inside
Sentrigo announced its top data security trends to watch for in 2010. A new type of threat: External attacks from the inside Generally, companies have viewed attacks as either …
GnuPG 2.0.14 released
The GNU Privacy Guard (GnuPG) is GNU’s tool for secure communication and data storage. It can be used to encrypt data, create digital signatures, help authenticating …
Cyber criminals become their own ISPs
Hounded by law enforcement agencies and security experts, cyber criminals have been witnessing the ISPs and hosting providers of their botnets being shut down at a greater …
A closer look at Panda ActiveScan 2.0 – Free Antivirus
Panda’s ActiveScan is an online security solution that scans your computer for viruses, worms and Trojans, spyware and other Internet threats. It detects and eliminates …
Facebook clickjacking attack spreads
A new clickjacking attack has targeted Facebook users. It presents itself in the form of a comment on the users’ account looking like this: The photos are, obviously, …
Winter Solstice themed SEO poisoning leads to malware
Any occasion seems to be good lately to launch a SEO poisoning campaign. Zscaler reports that searching for information about the Winter Solstice (21st of December) has been …
The new cybersecurity czar is Howard Schmidt
Earlier today, on the official White House blog, it has been announced that the post of Cybersecurity Coordinator will be filled by Howard A. Schmidt, a well-known name in the …
Rogue software details: SecurityCentral
SecurityCentral is a rogue security application. In order to remove it, find out what files and registry entries to look for below. SecurityCentral will prevent execution of …
Adobe patches Flash Media Server
Critical vulnerabilities have been identified in Adobe Flash Media Server (FMS) 3.5.2 and earlier versions. The vulnerabilities could allow an attacker, who successfully …
Intel patches flaws in its Trusted Execution Technology
Invisible Things Lab – who specialize in system-level security – issued yesterday the results of their research in which they describe how flaws in Intel’s …
Tripwire’s top 5 IT security predictions for 2010
With increasingly stringent compliance mandates, the explosion in virtualization interest and adoption, demands for audit reporting, and a spike in security breaches, 2009 has …
7 smartphone security tips
Lookout, a mobile security startup, suggests seven tips to staying safe on your smartphone. Whether you use your smartphone for business or pleasure, securing the computer in …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month