Q3 spam and malware trends statistics and analysis
Spam volume returned to record highs in Q3 with fairly steady monthly increases throughout the summer. The acquisition of innocent machines via email and Web-based infections …
iPhone password safe utility SplashID enhanced with new features
SplashData announced a major update to the version of its SplashID secure information manager for iPhone and iPod® touch. The new SplashID version 4.5 offers significantly …
New Comodo Internet Security suite
Comodo Security Solutions has released Comodo Internet Security (CIS), a complete antivirus and firewall security package free to all PC users. Among its many powerful …
Latest Microsoft vulnerability used to steal confidential data
PandaLabs has detected several malicious files that are exploiting the latest vulnerability announced by Microsoft (MS08-067) to infect users and steal confidential data …
Tips for safeguarding your personal assets
It’s only natural for people to be concerned about the safety of their financial assets. Here are a few valuable tips from TrustedID: Monitor your credit history …
Users want fingerprint security in their cell phones
According to a consumer survey, a vast majority of cell phone users (89%) use the device for text messaging and transmitting photos and files. In spite of the privacy of these …
Protection of private files with Folder Castle 4.0
MagneticSoft released Folder Castle 4.0, a major update of the security tool that protects computer files and folders from snoops and thieves. Folder Castle lets the user …
With encrypted Wi-Fi vulnerable everyone is risking their assets
The seventh annual Wireless Security Survey from RSA reveals the continued, dramatic growth of wireless networks in the world’s major financial centres. The survey of …
Unencrypted backup tapes endanger enterprise data protection
Despite high profile cases of unencrypted backup tapes going missing, more than a third of organizations still do not know if they will encrypt their backup tapes and half do …
Unified Threat Management: what’s next and why
A recent study by the Aberdeen Group suggests that on average, more than 120 new vulnerability disclosures are made each week, nearly 90% of which could be exploited remotely, …
Cybersecurity programs expected to remain strong under next administration
U.S. federal government identity and smart card programs have grown significantly under the Bush administration. But with the election less than two weeks away, one …
8x more malicious email attachments spammed out in Q3 2008
IT security and control firm Sophos has released the results of its investigation into the latest spam trends and revealed the top twelve spam-relaying countries for the third …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics