Up to 59% of companies with active malware on their networks
Some 59% of companies that scanned between 20 and 30,000 PCs with Malware Radar had active malware on their computers, according to Panda Security’s Malware Radar, an …
Symantec releases Norton Internet Security 2008, Norton AntiVirus 2008
Symantec launched Norton Internet Security 2008 and Norton AntiVirus 2008, industry leading security solutions that have been enhanced to provide computer users with …
Intel vPro processor technology fortifies security
Intel further reinforced desktop PC security by unveiling the newest generation of Intel vPro processor technology for businesses and IT with new innovations that add better …
A closer look at Cryptainer LE: your own secure hidden data vaults
This tool enables you to secure your data and ensure that you are doing the best for your privacy. Cryptainer LE uses 256 bit AES encryption and works by creating multiple 25 …
Video: User Account Control in Windows Vista
Jason Fossen, an instructor at the SANS Institute, discusses the controversial User Account Control in Windows Vista.
Price list: trojans, password stealers, spam servers
Just over a thousand dollars can buy a cyber-crook the tools needed to turn malicious action into financial profit, according to data from PandaLabs. This is thanks to a black …
The state of data security in North America
RSA announced the results of a survey commissioned by RSA entitled “The State of Data Security in North America.” Conducted by Forrester Consulting, the survey …
New web security and web filtering solutions for small businesses
GFI Software announced the release of the latest version of GFI WebMonitor for ISA Server, a solution that gives administrators comprehensive control over corporate web usage …
MSN worm with downloader functionality
The most important malware samples analyzed by PandaLabs this week are the MSNHorn.A and Nugache.M worms, and the Legmir.ASG Trojan. MSNHorn.A spreads through MSN Messenger by …
Video explaining Zhelatin/Storm Gang’s activities
The Zhelatin/Storm Gang has been very busy lately. Their spamming tactics have changed from sending an attachment to sending a link that directs recipients to an IP Address. …
CORE GRASP for PHP – detecting and blocking injection vulnerabilities
CORE GRASP for PHP is a web-application protection software aimed at detecting and blocking injection vulnerabilities and privacy violations. As mentioned during its …
AOL identity thief faces seven year jail sentence
Sophos is reminding computer users of the threat posed by phishers following the conviction of a 23-year-old identity thief who targeted users of AOL. Michael Dolan, formerly …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)