Please turn on your JavaScript for this page to function normally.
Trojans that use a new form of attack with rootkits

PandaLabs has detected the appearance of Trojans that include rootkits (MBRtool.A, MBRtool.B, MBRtool.C, etc.) designed to replace the master boot record (MBR), -the first or …

Watch the trailer for “The New Face of Cybercrime” documentary

Security vendor Fortify Software will soon be premiering their documentary “The New Face of Cybercrime”. Follow the link provided above for registering to San …

Removal tool for DNSChanger Mac trojan

DNSChanger Removal Tool detects and removes latest spyware targeting Mac OS X. DNSChanger Trojan (also known as OSX.RSPlug.A Trojan Horse) attacks users attempting to play a …

A logic bomb lends a former systems administrator 30 months in prison

A former computer systems administrator for Medco Health Solutions, Inc. was sentenced to 30 months in federal prison for planting a “logic bomb” in Medco’s …

Microsoft improves Windows Sidebar protection

Microsoft released an update for currently supported editions of Windows Vista that will protect gadget users. Gadgets are mini-applications designed to provide the user with …

Verizon rolls out unified threat management service

To help companies around the world better defend against the rising number of security threats, Verizon Business will monitor and manage a range of products that combine …

New GateKeeper prevents leap-frogging to unauthorized areas

Xceedium announced the availability of Xceedium GateKeeper 4.0, which delivers patent-pending LeapFrog Prevention technology, FIPS 140-2, Level 2 certification and other new …

Video: Relay attacks on card payment – vulnerabilities and defenses

Relay attacks allow criminals to use credit or debit cards for fraudulent transactions, completely bypassing protections in today’s electronic payment systems. This talk …

Beta version of safeSEARCH v2.0 browser toolbar

CyberDefender’s safeSEARCH Toolbar v2.0 BETA is a free browser plug-in that offers an improved search experience while protecting personal information and ensuring …

Research and analysis of stealth Master Boot Record rootkit

In 2005 Derek Soeder and Ryan Permeh, researchers from eEye Digital Security, presented eEye BootRoot. The technique used in their project wasn’t new and had been …

Top threats and security trends for 2008

Security experts at AVG published their analysis of 2007’s top viruses, Internet hacks and exploits, and reveal their forecast for the top security threats facing …

Looking back at 2007’s top viruses

Viruses made up some 15 percent of the threat landscape in 2007. According to AVG global security strategist Larry Bridwell, the 10 viruses exhibiting the most staying power …

Don't miss

Cybersecurity news