Please turn on your JavaScript for this page to function normally.
Third of UK businesses do not report e-crime

A survey by Infosecurity Europeof 285 companies has found that a third of businesses do not report their information security crimes and breaches.   Further to this, according …

AEP Business Partner Program launched

AEP Networks unveiled an enhanced channel program to fulfill increased market demand for its Policy Networking security and application access solutions. The new AEP Business …

Combined attack caused by the Spamta.VK worm and the Spamtaload.DT trojan

PandaLabs has issued warnings about the rapid propagation of two new members of the Spamta family: the Spamta.VK worm and the Spamtaload.DT Trojan. Both spread together and …

Critical vulnerability in Web 2.0

Fortify Software announced that its Security Research Group has documented the first major vulnerability associated specifically with Web 2.0 and AJAX-style software. Termed …

New version of ServerAssist network monitoring solution

Aldebaran Systems announced the availability of version 4.0 of their flagship product ServerAssist. ServerAssist, which has been described as the most comprehensive server …

Old-timers top malware chart

Sophos has revealed the most prevalent malware threats and email hoaxes causing problems for computer users around the world during March 2007. The figures, compiled by …

New versions of SurfControl’s neural network based dynamic categorization agent

SurfControl announced three new versions of Virtual Content Agent, a neural network based dynamic categorization agent.   Recent advances in neural network tuning and …

VeriFinger 5.0-based algorithm achieves best score

Fingerprint recognition algorithms from Neurotechnologija achieved top honors for reliability in this year’s Fingerprint Verification Competition (FVC2006). The …

IEClean and BOClean developer acquired

Comodo announced the acquisition of the assets of Privacy Software Corporation (PSC), a privately-owned company that develops security technology for the detection of malware, …

What trojans and viruses are roaming around the Net?

The virus world remains in a state of flux. In the first three months of 2007, we’ve seen three different malicious programs topping the ratings. Each month there are …

Zero-day ANI exploit spreads via malicious web sites

F-Secure corporation warns computer users of the recently discovered Windows Animated Cursor Handling vulnerability, also known as the ANI exploit. The exploit was first …

New steals the passwords included in the AutoComplete feature of the browser

PandaLabs has informed about the new Trojan Therat.B. This malicious code is designed to steal all types of passwords. However, it also has an extremely dangerous function, …

Don't miss

Cybersecurity news