Please turn on your JavaScript for this page to function normally.
Rogue software details: Win Security 360

Win Security 360 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Win …

IT budgets in 2010 to be at 2005 levels

IT budgets will essentially be flat in 2010, increasing by a weighted global average of 1.3 percent in nominal terms, compared with 2009 levels where IT budgets declined 8.1 …

Secure computing on a USB flash drive

The new IronClad USB drive shrinks a laptop’s hard drive – including the entire operating system, software applications, and files – onto a secure flash …

Four information management roles IT departments need

Gartner has identified four information-management roles that IT departments need to establish and recruit from outside the IT team in a major trend that will affect both IT …

Identity theft in focus

The stories are all too familiar: Money siphoned from a checking account. Unfamiliar charges racked up on a credit card bill. Discovering a loan has been taken out under false …

Week in review: Google and Adobe hacked by China, threats 2.0 and rogue Android applications

Here’s an overview of some of last week’s most interesting news and articles: Pay by password Verotel announced Verotel QuickCharge – a new tool for Internet …

8,378 reasons for better banking security

Reports that the Suffolk County Bank – a subsidiary of Suffolk Bancorp, the US financial institution – had its banking servers hacked last November were met with …

Attackers exploiting unpatched vulnerability in Internet Explorer

Microsoft is investigating a report of a publicly exploited vulnerability in Internet Explorer. There are active attacks attempting to use this vulnerability against Internet …

Top 3 tips for virtual infrastructure protection

Flexible infrastructure If you already have a disaster recovery solution in place make sure that it is flexible enough to be used for physical and virtual server platforms. …

Mobile security market to exceed $4 billion by 2014

Strong enterprise demand for data security is driving rapid growth in mobile device management services. According to a study by ABI Research, the number of smartphones …

Top 10 information security threats for 2010

“The start of a new year is a great time for companies to evaluate their information security practices and begin thinking about what threats they’ll be facing in …

Continuing evolution of Internet threats

Spammers continue to be cutting-edge marketers, this time taking advantage of the reputations of global brands, such as UPS, DHL and Facebook, to prompt opening of emails. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools