Simulated cyber attack will test US Government response
An article in The Atlantic with the title “U.S. To Be Hit By Massive Cyber Attack On Feb. 16. Asterisk.” has set some readers to panic mode because they assumed it …
An article in The Atlantic with the title “U.S. To Be Hit By Massive Cyber Attack On Feb. 16. Asterisk.” has set some readers to panic mode because they assumed it …
To catch a thief, you must think like a thief – the best way to defend an asset is to get inside the head of the attacker and predict his actions. That’s the …
The ZBOT/Zeus banking Trojan has been a well-known fixture of the threat landscape these last years, and can thank its developers for the constant changes that keep it from …
A SurfRight report shows statistics that give credibility to the lately popular opinion that one anti-virus solution is no longer enough to be sure your computer isn’t …
It seems that one of the predictions for 2010 from Websense’s report is likely to come true: bots will be able to detect and actively uninstall competitor bots. SpyEye …
Operation Aurora has become a name that is instantly recognized by everyone involved in cyber security. Speculation still abounds regarding the people and/or nation behind it, …
Following the announced Internet censorship plans of the Australian government, which will likely include Internet filtering and the banning of some forms of pornography, the …
According to recently published Websense report for the second half of 2009, 95 percent of user-generated posts on Web sites are spam or malicious, and almost 14 percent of …
You may think you are being particularly prudent by not putting all of your personal information on your social network account, and you are right to think so. But what if you …
USB Secure helps you password protect USB drives, thumb drives, memory cards, external drives and flash drives. It supports plug and play and runs automatically once a USB …
The Trusted Platform Module (TPM), a secure chip that stores cryptographic keys and when activated adds an extra layer of protection through encryption, has been until now …
A phishing site masquerading as the secure login page of CenturyLink, the fourth largest local exchange telephone carrier in the US in terms of access lines, has been …