Please turn on your JavaScript for this page to function normally.
Microsoft prepares two security bulletins

Microsoft announced their plan to release two Windows security updates on Tuesday January 8 as part of the regular software patch cycle. One of the bulletins is rated critical …

Facebook widget installs Zango spyware

Fortinet Global Security Research Team discovered a malicious Facebook Widget actively spreading on the social networking site which ultimately prompts users to install the …

Sourcefire 3D gets a Network Intrusion Prevention System Certification from ICSA Labs

Sourcefire 3D System’s 3D3800 Sensor has received Network Intrusion Prevention System certification from ICSA Labs, an independent division of Verizon Business. …

Trojan horses the leading cyber-threat in 2007

Trojans were responsible for 25.83% of infections recorded by ActiveScan, the online scanner from Panda Security, during 2007. This type of malicious code accounted for 77.40% …

New book release: “Mac OS X Leopard: The Missing Manual”

David Pogue’s timely new book “Mac OS X Leopard: The Missing Manual” offers honest, straightforward, and fun-to-read instructions on all things Leopard, …

They really don’t want you to have a happy new year

Sophos is warning workers returning from the New Year holidays to be wary of internet attacks taking advantage of the celebrations. New versions of the Dorf worm (W32/Dorf-AE, …

New way of auditing Oracle and UNIX password security

ElcomSoft has added support for Oracle and UNIX passwords to Elcomsoft Distributed Password Recovery v. 2.10. The latest version of ElcomSoft’s Windows password recovery …

Example of double spam sent to mailboxes and mailing lists

A way of double spamming – combo of spamming email users and mailing lists to get a profit: #1 Spammer sends a spam e-mail to a mailing list that doesn’t have …

Video: information security – before and after public-key cryptography

Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through the 20th century and into the 21st. In the 1970s, …

Guide for assessing the security controls in federal information systems

NIST recently released a draft Special Publication 800-53A, Guide for Assessing the Security Controls in Federal Information Systems. This final public draft provides …

Weekly report on viruses and malware X-mas edition

As for the most harmful malware strains this week, the list is headed by the Virtumonde spyware and the NaviPromo and VideoAddon adware.As for the new samples that appeared …

Bluetooth guardian for Series 60 phones

Symbian Guru released BT Guard – the security software which helps to protect the phone from unauthorized access via Bluetooth. BT Guard changes your Bluetooth status …

Don't miss

Cybersecurity news