Koobface says goodbye to Facebook
Koobface – the computer worm that targets users of the social networking websites such as Facebook, MySpace, Twitter and others – has stopped using Facebook to …
Malware decreases, Trojans still dominate
According to data gathered by Panda Security, only 39 percent of computers scanned in February were infected with malware, compared to 50 percent last month. Trojans were …
Immunet 3.0 introduces custom anti-malware signatures
Sourcefire released Immunet 3.0 which enables users to create custom anti-malware signatures for more accurate protection against targeted attacks and offers a Cloud Recall …
Conficker: Lessons learnt
The Conficker worm is the largest computer worm infection with more than seven million government, business and home computers in over 200 countries now under its control. In …
Online security tips for avoiding malware
Every month hundreds of thousands of unsuspecting computer users are faced by the inconveniences, complications and data loss that can come with Trojan horses, worms and email …
Tuesday is the most active day for threats
The most active day for threat-related traffic worldwide is Tuesday, with Monday a close second, according to a report by SonicWALL. This pattern holds true for the U.S., …
Fake Microsoft security update carries Autorun worm
An e-mail supposedly coming from Microsoft and urging the recipients to update their Windows has started making rounds yesterday: There are a lot of people out there who will …
Worm blocks access to Facebook
A relatively new worm that Symantec named W32.Yimfoca presents a very interesting and never before seen modus operandi. A variant of the worm spreads via Yahoo! Messenger and, …
Web-based stealth attacks on network security will dominate 2011
Viruses will become more subtle and even harder to detect in 2011, and the primary line of attack will continue to be via the internet, according to Redscan. Malware is now …
Experimental botnet reveals long sought answers
Is there a better way of analyzing the ins and outs of a botnet than making one yourself? The answer to that question was negative for ESET’s researcher Pierre-Marc …
Featured news
Resources
Don't miss
- Fake Claude Code install pages highlight rise of “InstallFix” attacks
- Decoding silence: How deaf and hard-of-hearing pros are breaking into cybersecurity
- Turning expertise into opportunity for women in cybersecurity
- Open-source tool Sage puts a security layer between AI agents and the OS
- Iran-linked APT targets US critical sectors with new backdoors