Please turn on your JavaScript for this page to function normally.
Trojans accounted for 54.4 percent of the new malware detected in Q2 2006

Over fifty-four percent of the new malware detected by PandaLabs in the second quarter of 2006 were Trojans. This data shows an increase compared to the previous quarter, when …

Acunetix Web Vulnerability Scanner version 4 released

Acunetix today announced the release of Acunetix Web Vulnerability Scanner version 4. This latest version provides a more comprehensive solution for enterprises wanting to …

Global threat report on Web filtering, spyware and viruses

ScanSafe has released its latest Global Threat Report on Web filtering, spyware and viruses. The report is based on real-time analysis of more than five billion Web requests …

Vladimir Putin death spam spreads a trojan horse

IT security firm Sophos has warned of a spam campaign that poses as a breaking news report about the death of Russian President, Vladimir Putin, but is actually an attempt by …

Widespread Gmail phishing email lures users with cash prize

IT security firm Sophos has warned of a widespread phishing email campaign that tries to trick users out of money by pretending to be a cash prize from Gmail, Google’s …

World’s smallest secure USB flash disk introduced

Netac Technology Co Ltd, the company that invented the USB flash memory drive, has introduced the world’s smallest USB flash disk with built-in security. Weighing just …

Aurora Password Manager 1.5 released

Animabilis Software announced the release of version 1.5 of Aurora Password Manager. This password management solution functions as a single protected storage for all your …

Secure Computing to acquire CipherTrust

Secure Computing Corporation today announced that it has signed a definitive agreement to acquire CipherTrust, Inc., the global leader in messaging security. CipherTrust, a …

Microsoft Patches Seven Vulnerabilities

Microsoft alerted us this time about seven vulnerabilities of which five were rated critical and two important. There are vulnerabilities in the Server service, the DHCP …

Insidious network worm threatens enterprise security

If you are used to sharing data over the Internet or your enterprise’s intranet, apply caution. A network worm that will eventually bring in dangerous Trojans to your …

Successful Backups Are Not Enough

Overview Data protection requirements have moved on from the purely technical question of “Did the backup work?” to the much more complex question of “Is my …

LINX members unite in the war against spam

At the recent London Internet Exchange (LINX) AGM, the 200 strong membership agreed operational principles for spam management teams to share information while ensuring that …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools