Please turn on your JavaScript for this page to function normally.
Week in review: Mafia-like cyber crime syndicates, Pwn2Own contest and cloud computing risks

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Law firms are the new banks The new favorite targets of cyber …

Is it safe to file your taxes online?

Tax season. It’s not a favorite time of year for most people, but the deadline for filing income taxes for many countries is quickly approaching. And, especially in …

On the origin of spam

So you received another spam e-mail message. On the surface it seems rather ordinary. It’s an advertisement for a handful of brand-name prescription drugs. When viewed …

Rogue software details: Home Personal Antivirus

Home Personal Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Millions continue to click on spam

Even though over 80% of email users are aware of the existence of bots, tens of millions respond to spam in ways that could leave them vulnerable to a malware infection, …

First dual biometric reader

ZK Software ntroduced the world’s first dual biometric reader. Just the touch of a finger, a one second facial scan or flash of an ID card is all it takes for the iFace …

Checklist to accelerate your software security efforts

In recent years, Software-as-a-Service (SaaS) has emerged as a viable application delivery method, and most enterprises are now including some SaaS software in their …

Symantec web security monitoring against pervasive threats

Symantec announced Web Security Monitoring, a new managed security service which monitors organizations’ proxy and gateway security devices for connections from hosts …

Turning point for security decision making

According to IBM and The Ponemon Institute research, 77 percent of C-level executives report that their organization has experienced a data breach at some point, while all …

The Conficker conundrum

Security experts estimate that Conficker, a particularly malicious worm, targeting MS Windows, has already infected more than 7 million computers around the world. Conficker …

Tax season: Identity thief’s paradise

Many consumers look forward to tax season in anticipation of a hefty return. In the same instance, many identity thieves look forward to tax season as well, only in …

Rogue software details: Coreguard Antivirus 2009

Coreguard Antivirus 2009 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools