Tips for protecting against malware, scams and identity theft
Don’t add friends you don’t actually know when using social networking sites. Often the “free” code available in social networking sites, such as …
Spammers turn to PDF files in latest pump-and-dump scam
Sophos is warning of a new ‘pump-and-dump’ stock spam campaign which uses a PDF file to hoodwink potential investors. Sophos has identified email messages being …
Virtualisation adopters face security challenges
Virtualisation is moving into the mainstream with 50% of IT professionals already using this new technology, or planning to do so within the next 18 months, reveals a survey …
USB Flash Drive worm from the “good guys”
Sophos has discovered a worm which copies itself onto removable drives, such as USB flash drives, in an attempt to spread information about AIDS and HIV. The LiarVB-A worm …
Secure Computing updates its URL filtering solution
Secure Computing announced a new version of SmartFilter 4.2 with TrustedSource. It provides granular protection against today’s Web 2.0 threats, allowing companies to …
Designing IS strategies to stay ahead of network threats
Headline-grabbing news about computer security breaches and their devastating consequences on an agency and its constituents is the stuff of every CSO’s nightmare, …
Hackers insert footage of nuclear explosion into webcam
Czech hackers managed to get access to a webcam and insert realistic footage of nuclear explosion. The incident was broadcasted on the Czech TV programme Panorama on Sunday. …
Reactions to the HP acquisition of SPI Dynamics
Here are a couple of quotes found while traversing today’s media releases regarding the HP’s acquisition of SPI Dynamics. Microsoft to follow? “This is the …
Break a security product beta and win prizes
BitDefender is inviting the public to test BitDefender Total Security 2008, the flagship product of the company’s upcoming family of Internet security products. Among …
Internet security forecast revisited
McAfee just revisited its top ten predictions for security threats in 2007. Their research shows that threats including data-thieving phishing Web sites are on the rise, as …
Capabilities and weaknesses of token-based authentication
From Martin McKeay’s blog: As most security professionals know, passwords are a losing proposition. We use them because the capability comes with your operating system, …
HP to acquire web application security expert
HP today announced that it has signed a definitive agreement to acquire SPI Dynamics, Inc., a provider of web application security assessment software and services, to further …
Featured news
Resources
Don't miss
- Don’t let these open-source cybersecurity tools slip under your radar
- Cyber trends set to influence business strategies
- How to use Apple’s App Privacy Report to monitor data tracking
- North Korean IT workers are extorting employers, FBI warns
- GUI frontends for GnuPG, the free implementation of the OpenPGP standard