Latest spam trends and predictions for the end of the year
As the percentage of fraudulent emails received by users in the third quarter of 2011 has risen sharply and they represented 2 percent of all received spam emails, Kaspersky …
Focusing on new technologies instead of security threats
In the rush to utilize new technologies and move into the increasingly borderless world of cloud computing, mobile devices and social media, a growing gap is developing …
Most firms don’t coordinate security planning
Despite the potentially crippling impact of security events on corporate performance, many executives report that their security function is not well coordinated with …
New analytics advance IBM security intelligence portfolio
IBM is extending its proven security services portfolio to include enhanced analytic tools and services to provide deeper, real-time analysis of advance threats. By detecting …
IT Operations Analyzer gets expanded monitoring capabilities
Hitachi announced a new version of its IT Operations Analyzer, an integrated availability and performance monitoring tool that can help reduce complexity, streamline …
Kelihos, Waledac and Storm malware believed to have same author
The recent takedown of the Kelihos botnet by Microsoft has received a lot of attention, despite the fact that the botnet is rather small (around 41,000 computers located …
eBay hacker receives 3-year suspended sentence
The Romanian hacker who repeatedly hacked eBay servers, accessed parts of its sites that were off-limits to users and even accessed a number of eBay accounts has been handed …
Unique malware URLs increased 89 percent
Websites loaded with malware increased a massive 89 percent in the third quarter compared to Q2 2011. According to an IID report, the most impersonated organizations include …
Five million new malware samples
In the third quarter of 2011 alone, five million new malware samples were created. In addition, Trojans set a record for becoming the preferred category for cybercriminals to …
Carbonite privacy blunder results in spam
Popular online backup service Carbonite has made another privacy misstep. Computerworld blogger Richi Jennings, a self styled “anti-spam wonk”, has discovered that …
First joint EU-US cyber security exercise
The first joint cyber security exercise between the European Union and United States is being held today in Brussels, with the support of the EU’s Network and …
Fake AV peddlers change their tactics
There has been a decline in rogue AV schemes lately, and researchers chalk it up to a combination of law enforcement and security community efforts and an increased coverage …
Featured news
Resources
Don't miss
- Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads