Please turn on your JavaScript for this page to function normally.
Rogue software details: Win Antispyware Center

Win Antispyware Center is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

OpenNetAdmin: Database managed inventory of your IP network

OpenNetAdmin is a system for tracking basic IP network attributes in a database. A web interface is provided to administer the data as well several backend processes for …

Week in review: Facebook, phishing and social engineering

Here’s an overview of some of last week’s most interesting news, articles, reviews, interviews and videos: Google now supports encrypted search Google just rolled …

Video: Facebook privacy changes

There has been lot of talk on the latest Facebook privacy changes. Robert Scoble published a 10 minute video from the Facebook press event where Mark Zuckerberg discussed the …

Trio of new high risk Adobe vulnerabilities

TippingPoint DVLabs updated their list of upcoming security advisories with three new high severity Adobe vulnerabilities. As this is just a preview of future advisories, the …

CERT Basic Fuzzing Framework now available

The Basic Fuzzing Framework (BFF) consists of two main parts: a Linux virtual machine that has been optimized for fuzzing a set of scripts and a configuration file that …

IBM opens security operations center in Bangalore

IBM announced the opening of a new global security operations center in Bangalore. Adding to the network of IBM global security operations centers, this state-of-the-art …

47% of IT pros see security audit costs going up in 2010

Forty-seven percent of IT security professionals believe that security audit costs will increase in 2010, according to a recent survey by nCircle, the leading provider of …

Facebook users against default sharing of their private data

A poll of 605 Facebook users conducted by IT security and data protection firm Sophos in the wake of the latest changes to the social network’s privacy settings has …

New book: “iPad: The Missing Manual”

In his new book, New York Times tech columnist, bestselling author, and iPad expert J.D. Biersdorfer shows you how to get the most out of Apple’s sleek tablet. With this …

Windows WMI used for malware

Trend Micro’s engineer Lennard Galang has written a blog post about two pieces of malware that leveraged a Windows service, Windows Management Instrumentation (WMI), to …

Breakdown of all the major online threats in May

Latest MessageLabs Intelligence Report reveals that nine out of ten spam emails now contain a URL link in the message. In May, five percent of all domains found in spam URLs …

Don't miss

Cybersecurity news