Ministry of Defence confirms loss of recruitment data
UK’s Ministry of Defence confirmed that a laptop was stolen from a Royal Navy officer in Birmingham last week, on the night of 9/10 January, and as a result, a large …
Video: demonstration of the Mac OS X DNSChanger Trojan
The video demonstrates the results of the DNS changes made on a Mac OS X system.
Last week malware “winners”
According to data gathered at the Infected or Not website the Bagle.HX worm was responsible for most infections over the last week. Two strains of adware, Comet and Starware, …
Malware findings 2007: instant messaging and P2P
FaceTime announced its initial findings of 2007 malware trends affecting today’s enterprise networks through instant messaging (IM), P2P file sharing and chat …
New UK postgraduate course in computer forensics and investigations
Computer Forensics and Investigations, a new postgraduate course from The UK’s Open University provides an introduction to the world of digital evidence collection, …
Skype cross zone scripting vulnerability details and video
Skype uses Internet Explorer web control to render HTML content. This is used also for providing “add video to mood” and “add video to chat” …
VIA board for network security appliances
VIA Technologies announced the VIA NAB 7500 embedded board for advanced network security solutions. The feature-packed VIA NAB 7500 is a highly integrated Network Appliance …
Second beta edition of AVG 8.0 out for testing
GRISOFT, developer of the AVG family of security software products, today released the second beta edition of AVG 8.O for Windows for public testing. AVG 8.0 offers a …
Shifts in malware trends since 1986
Most of today’s Internet criminals are operating from Russia, China and Southern America. Over the next five years, there will be a significant increase in attacks from …
Shifts in malware trends since 1986
Most of today’s Internet criminals are operating from Russia, China and Southern America. Over the next five years, there will be a significant increase in attacks from …
What is a greynet?
Internet communications have evolved from point-to-point, asynchronous channels like email to real-time, presence-oriented communications like IM, P2P file sharing, Skype, and …
Programmer admits planting a “logic bomb”
A computer programmer hired by the St. Cloud Hospital to create a computer-based training program for hospital employees pleaded guilty today in St. Paul in connection with …
Featured news
Resources
Don't miss
- Healthcare security is broken because its systems can’t talk to each other
- Wanna bet? Scammers are playing the odds better than you are
- Google adds Emerging Threats Center to speed detection and response
- UK’s new Cyber Security and Resilience Bill targets weak links in critical services
- Patch Tuesday: Microsoft fixes actively exploited Windows kernel vulnerability (CVE-2025-62215)