Please turn on your JavaScript for this page to function normally.
Phishing attack focuses on adult webcam users

IT security firm Sophos has warned of a new phishing attack against users of an adult webcam site. Spam experts based in Sydney, one of Sophos’s virus, spyware and spam …

Mac security freeware helps you protect your privacy

GlowWorm FW Lite is a neat looking application that can help you protect your privacy by enabling you to control your computer at the network level. It works through a simple …

Microsoft Internet Explorer crash is exploitable

On August 8th Microsoft released MS06-042 which was a cumulative update for Internet Explorer. Over the course of a few days after the release of this patch various Internet …

Backdoor sneaks into computers through Japanese text editor

Text files are perceived to be rather safe and harmless to download from the Internet or emails and open in one’s computer without much fear about Virus infection.  …

Sophos offers free rootkit detection and removal tool

Sophos today announced the availability of a new free-of-charge, standalone tool offering comprehensive rootkit detection and removal capabilities. Sophos Anti-Rootkit …

Application Security seeeks Common Criteria Certification

Application Security, Inc. is pursuing Common Criteria certification for the current versions of its flagship products — AppDetective, a vulnerability assessment …

Multi-purpose Windows security and care tool released

IObit.Com today announces the release of the newest version of Advanced WindowsCare v2 Personal. It is a multi-purpose Windows care tool, which is intended for solving an …

Couple charged in a pump-and-dump stock spam

42-year-old Jeffrey Stone and his wife Janette Diller Stone of Connecticut, USA, have had civil fraud charges filed against them by the Securities and Exchange Commission …

Anti-keylogger plugin for Microsoft Internet Explorer

A browser plugin named KeyScrambler was recently released by Florida startup QFX Software. The Personal edition is free for download at the company’s website and it …

10 steps to fortify the security of your MySQL installation

For those who wish to enhance or fortify the security of the MySQL installation the following technical 10 steps are a good start. Step 1: Run MySQL in a chroot jail Chroot …

Weekly Report on Viruses and Intruders – Oscarbot.KD worm and the Nabload.JC and Banker.EEA Trojans

Oskarbot.KD is the first malicious code to infect systems by exploiting the Microsoft MS06-040 vulnerability. According to information from PandaLabs, Oscarbot.KD searches for …

Miami man accused of creating hurricane Katrina phishing website

IT security firm, Sophos, is reminding computer users of the dangers of identity theft as a 20-year-old man is charged in relation to a phishing website which claimed to …

Don't miss

Cybersecurity news