Please turn on your JavaScript for this page to function normally.
Malicious infections enter 99% of enterprise networks

There is a significant gap in today’s enterprise IT defenses, as advanced malware and targeted attacks are easily evading traditional defenses, such as firewalls, …

Most security pros don’t think a breach will happen to them

New findings from a Tenable Network Security study have uncovered an “It Won’t Happen to Me” mentality amongst security professionals. According to the …

Rogue Google SSL certificate missed by auditors

VASCO Data Security International – the owner of DigiNotar, the Dutch Certificate Authority who issued the rogue SSL certificate for *.google.com domains that has …

Rogue Google SSL certificate allowed MITM Gmail attacks

Recently discovered attempts of an SSL man-in-the-middle attack against Google users – spotted by a number of Iranian Internet users – have revealed that Dutch …

2011: Year of the hack

In a year that IT security experts have labeled the “Year of the Hack,” Bit9’s endpoint survey of 765 IT executives revealed that Advanced Persistent Threat …

Google servers as a DDoS tool

Google’s servers can be used by cyber attackers to launch DDoS attacks, claims R00T_ATI, a penetration tester for Italian security consulting firm AIR Sicurezza. He …

Is this the phishing email that caused the RSA breach?

“I forward this file to you for review. Please open and view it,” says simply the email that is thought to have been the means of deploying the backdoor that …

Illegal keygen for well-known AV solution leads to infection

An illegal key generator for the recently released latest version of the TrustPort Internet Security solution brings big trouble to unsuspecting users, warns BitDefender. …

Bitcoin mining botnet also used for DDoS attacks

A recently discovered P2P Bitcoin mining botnet has acquired DDoS capabilities, warns Kaspersky Lab expert Tillmann Werner. It’s main reason of existence has so far been …

Anonymous member charged with computer offences

Peter David Gibson, 22, has been charged with conspiracy to do an unauthorized act in relation to a computer, with intent to impair the operation of any computer or prevent or …

Zeus rival boasts of eluding tracker services, fails

Kaspersky Lab expert Jorge Mieres wrote yesterday about Ice IX – the first crimeware based on the leaked Zeus source code. “Ice IX Botnet is the first new …

Install one Trojan, get three more

Downloader Trojans are often used by cyber crooks to thoroughly infect systems in order to extract anything that might be of value to them. Trojan.Badlib is a particularly …

Don't miss

Cybersecurity news