IT Operations Analyzer gets expanded monitoring capabilities
Hitachi announced a new version of its IT Operations Analyzer, an integrated availability and performance monitoring tool that can help reduce complexity, streamline …
Kelihos, Waledac and Storm malware believed to have same author
The recent takedown of the Kelihos botnet by Microsoft has received a lot of attention, despite the fact that the botnet is rather small (around 41,000 computers located …
eBay hacker receives 3-year suspended sentence
The Romanian hacker who repeatedly hacked eBay servers, accessed parts of its sites that were off-limits to users and even accessed a number of eBay accounts has been handed …
Unique malware URLs increased 89 percent
Websites loaded with malware increased a massive 89 percent in the third quarter compared to Q2 2011. According to an IID report, the most impersonated organizations include …
Five million new malware samples
In the third quarter of 2011 alone, five million new malware samples were created. In addition, Trojans set a record for becoming the preferred category for cybercriminals to …
Carbonite privacy blunder results in spam
Popular online backup service Carbonite has made another privacy misstep. Computerworld blogger Richi Jennings, a self styled “anti-spam wonk”, has discovered that …
First joint EU-US cyber security exercise
The first joint cyber security exercise between the European Union and United States is being held today in Brussels, with the support of the EU’s Network and …
Fake AV peddlers change their tactics
There has been a decline in rogue AV schemes lately, and researchers chalk it up to a combination of law enforcement and security community efforts and an increased coverage …
Managing firewall risks in the cloud
67 percent of IT security respondents in a Ponemon Institute study, report that their organization is very vulnerable or vulnerable because cloud ports and firewalls are not …
Registry Decoder: Digital registry forensics
Registry Decoder is a free and open source tool for the acquisition, analysis, and reporting of registry contents. It comes with an online acquisition component and an offline …
Norton updates Tablet Security and Mobile Security
Symantec announced Norton Tablet Security and new updates for Norton Mobile Security, including a new “Scream” feature that helps users find a lost or stolen phone …
The value of digital content
Although 51% of Americans have experienced a computer crash where they lost all of their digital files, more than one-third (39%) admit they have never backed up their …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!