Data leak prevention solution from Trend Micro
Trend Micro announced Trend Micro LeakProof 3.0, the company’s first data leak prevention solution. The latest version of LeakProof, obtained through the acquisition of …
Amount of malware grew by 100% during 2007
In its 2007 data security summary, F-Secure reports of a steep increase in the amount of new malware detected during 2007. In fact the amount of cumulative malware detections …
Wireless keyboards encryption cracked
Wireless keyboards have been distributed for years all over the globe. After the initial infraded based keyboards, the vendors developed radio frequency based models operating …
Guidance tips for consumers on how to navigate data security breaches
Coalition for Data Security issued its new guide First Do No Harm: How to respond when your consumer data is breached – a practical guide for action when consumers are …
Trojans were the malware that caused most infections in November
According to data gathered by the online antivirus Panda ActiveScan, Trojans (25%) and adware (23%) were the malware that caused most computer infections in November. Worms …
New U.S. Patent for network port profiling
Lancope announced that U.S. Patent No. 7,290,283 has been issued for the company’s groundbreaking network port profiling invention, which delivers a more accurate and …
Security issues with MD5 hash values
Researchers Marc Stevens, Arjen Lenstra and Benne de Weger released a paper titled “Vulnerability of software integrity and code signing applications to chosen-prefix …
New version of GFI EndPointSecurity released
GFI Software released a new version of GFI EndPointSecurity, a solution that helps to control the use of portable storage devices – such as iPods, flash drives, USB …
Trojans target Lineage online game players
PandaLabs has detected the appearance of four new variants of the Lineage Trojan over the last two days. These new variants are Lineage.GNH, Lineage.GNE, Lineage.GMT and …
New security book – “The Craft of System Security”
Whether you’re a security practitioner, developer, manager, administrator, or user, this book will give you the deep understanding necessary to meet today’s …
FBI “Operation Bot Roast II” may underestimate global botnet threat
Yesterday the FBI reported it had obtained three new indictments and successfully secured key convictions of botnet cyber criminals.  In June 2007, part one of the FBI …
Teenager allegedly headed international hacking ring
Sophos reports that a teenager from New Zealand, believed to be the brains behind an international cyber gang, has been arrested. The gang was allegedly responsible for …
Featured news
Resources
Don't miss
- Nodepass: Open-source TCP/UDP tunneling solution
- Why cybersecurity hiring feels so hard right now
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules