Please turn on your JavaScript for this page to function normally.
Rogue software details: Total Win 7 Security

Total Win 7 Security is a rogue security application. In order to remove it, find out what file entry to look for below. Known system changes: File c:\userprofile\Local …

Solving the data privacy puzzle

The absence of uniform global legislation, regulations or standards for data privacy is posing a major data privacy puzzle for organizations faced with protecting the …

Google releases web application security scanner

Google released Skipfish, a free fully automated, active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out …

Week in review: Amateur-run botnets, Mac OS X ransomware and feds on social networks

Here’s an overview of some of last week’s most interesting news, articles, reviews and videos: The rise of amateur-run botnets It used to be that cyber criminals …

The cloudy world of passwords

With the growth of social networking, online media consumption and cloud computing, every day millions of people log in to a variety of different sites using a username and …

Barclays under strong phishing shower

A highly productive phishing scam, with more than 180 messages sent in three minutes, hits a big chunk of the online segment of Barclays members Various people are wondering …

Rogue software details: DoubleVaccine

DoubleVaccine is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Understanding social engineering

At the heart of many of the malicious ploys that we see online is one underlying concept: social engineering. Deceptive social engineering tactics are interwoven throughout …

1 in 4 kids have tried hacking

Despite 78% agreeing that it is wrong, 1 in 4 of UK’s children have tried their hand at hacking into others’ Facebook accounts mostly by surreptitiously using the …

Rogue software details: Antivirus 7

Antivirus 7 is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\Desktop\Antivirus7.lnk …

Enterprise 2.0 privacy concerns in Europe

Transparent access to people and information is Enterprise 2.0’s great promise. It’s tempered, however, by a privacy risk that is especially sensitive in the …

Cloud-based rapid disaster recovery

Unitrends unveiled its Vault2Cloud disaster recovery service, monitored and managed through a simple, easy-to-use Web 2.0-based user interface. Vault2Cloud solves many of the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools