Please turn on your JavaScript for this page to function normally.
Rogue software details: Live Enterprise Suite

Live Enterprise Suite is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\CommonDesktop\Internet …

Basic vulnerability found in most voice encryption products

IT security blogger Notrax claims to have successfully intercepted and compromised phone calls made using 12 commercially available mobile voice encryption products. Using a …

Many cybercrimes go unreported

More than half of the 500 respondents (58%) of the 2010 CyberSecurity Watch Survey believe they are more prepared to prevent, detect, respond to or recover from a cybercrime …

Hacker attacks on healthcare organizations double

SecureWorks reported that attempted hacker attacks launched at its healthcare clients doubled in the fourth quarter of 2009. Attempted attacks increased from an average of …

Online fraud a significant revenue loss for merchants

UK merchants say online fraud is the greatest threat they face, according to the Sixth Annual UK Online Fraud Report. Merchants stated that they lost an average of 1.8% of …

iPhone application for remote desktop access

Array Networks launched the DesktopDirect iPhone Client, the first iPhone application for enterprise remote desktop access. Employees now have full-feature access on the …

Cisco Press titles for new CCNP certification exams

Cisco Press, the official publisher to the CCNP exams, brings a portfolio of learning and preparation products to the new 2009 CCNP certification exams launched recently by …

Apache SpamAssassin 3.3.0 released

Apache SpamAssassin 3.3.0 is a mature, wide-spectrum, extensible email filtering package deployed by hundreds of thousands of organizations worldwide. Apache SpamAssassin …

Virus writers produce hardware damaging code?

BitDefender identified a new e-threat that combines the destructive behavior of a virus with the spreading mechanisms of a worm. There are two known variants of this virus, …

Devious ransom trojan takes data hostage

Taking data hostage is not a new invention in the world of cybercrime but a trojan currently infecting computers does it in a way that can leave the victim unaware that he has …

TechCrunch compromised by security exploit

Popular technology blog TechCrunch was compromised earlier today and their site was replaced by a message that links to a website offering assorted links to pirated material: …

Collection of penetration testing tools

Complemento is a collection of tools for penetration testing that has been included in BackTrack 4 Final LetDown is a TCP flooder that has an (experimental) userland TCP/IP …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools