Zeljka Zorz
32% of computers with AV protection are infected
A SurfRight report shows statistics that give credibility to the lately popular opinion that one anti-virus solution is no longer enough to be sure your computer isn’t …
Botnet turf war on the horizon
It seems that one of the predictions for 2010 from Websense’s report is likely to come true: bots will be able to detect and actively uninstall competitor bots. SpyEye …
Operation Aurora malware investigated
Operation Aurora has become a name that is instantly recognized by everyone involved in cyber security. Speculation still abounds regarding the people and/or nation behind it, …
Government sites crumple under Operation Titstorm’s DDoS attack
Following the announced Internet censorship plans of the Australian government, which will likely include Internet filtering and the banning of some forms of pornography, the …
81% percent of e-mail links to malware
According to recently published Websense report for the second half of 2009, 95 percent of user-generated posts on Web sites are spam or malicious, and almost 14 percent of …
Data harvested from Facebook used in boiler room scams
You may think you are being particularly prudent by not putting all of your personal information on your social network account, and you are right to think so. But what if you …
A closer look at USB Secure 1.3.0
USB Secure helps you password protect USB drives, thumb drives, memory cards, external drives and flash drives. It supports plug and play and runs automatically once a USB …
Researcher hacks security encryption chip found on millions of PCs
The Trusted Platform Module (TPM), a secure chip that stores cryptographic keys and when activated adds an extra layer of protection through encryption, has been until now …
Phishing site spoofing secure login page
A phishing site masquerading as the secure login page of CenturyLink, the fourth largest local exchange telephone carrier in the US in terms of access lines, has been …
Zero-day vulnerabilities on the market
Zero-day vulnerabilities have become prized possessions to attackers and defenders alike. As the recent China-Google attack demonstrated, they are the basis on which most of …
Sensitive information retrieved from P2P networks
Security researchers Larry Pesce and Mick Douglas demonstrated on Friday – at this year’s ShmooCon security conference in Washington, D.C – the amazing …
Biggest Chinese hacker training site taken down
Black Hawk Safety Net, the biggest Chinese hacker training site, has been shut down by the police. The tally is: three people arrested; nine Web servers, five computers and …
Featured news
Sponsored
Don't miss
- Prompt Fuzzer: Open-source tool for strengthening GenAI apps
- How insider threats can cause serious security breaches
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap