Please turn on your JavaScript for this page to function normally.
Zbot acquires file infection feature

A Zbot Trojan variant that has the ability to infect other files has been discovered recently. It searches for .exe files in predefined places and injects into them 512 bytes …

Spying the spy: How to turn Trojans against criminals

“Researchers do vulnerability research on so many various application, why not to do it on this one?” asked himself Andrzej Dereszowski, founder and director of …

TinyIDS: Distributed intrusion detection system

TinyIDS is a distributed Intrusion Detection System (IDS) for Unix systems. It is based on the client/server architecture and has been developed with security in mind. The …

So, you bought a fake AV. What happens next?

A Sunbelt researcher has had the “fortune” of having a relative fall for the scam, which gave him the opportunity to take a peak at the process following the …

Rogue software details: Vistop

Vistop is a rogue security application. In order to remove it, find out what folders and registry entries to look for below. Known system changes: Folders …

Facebook profound privacy concerns

Facebook founder Mark Zuckerberg may believe that “the age of privacy is over,” but users of world’s most popular social networking site are actively …

Passive Vulnerability Scanner 3.2 released

Tenable Network Security released version 3.2 of the Passive Vulnerability Scanner (PVS), a passive technology that monitors network traffic and provides real-time …

Escalation of pharma spam from Gmail accounts

A recent noticeable upsurge of spam massages coming from compromised Gmail accounts has led the unfortunate victims to speculate that there is a bug in the Gmail mobile …

Google shines a light on government requests

Among all the search engines and ISPs around the world, Google has taken the first step towards transparency when they revealed their Government Requests tool on Tuesday: …

Cloud computing and social networking expose businesses to attacks

Business use of technology is evolving faster now than at any point in the last decade. Internet use has moved way beyond email and websites and into the realms of social …

Online protection tips

To help individuals of all ages stay safe online and protect themselves against identity theft and the repercussions of risky online behavior, RSA shared the following safe …

Apache: Authentication and authorization against an LDAP server

mod_psldap is an Apache module for leveraging LDAP services built on the OpenLDAP library and the Apache APIs, to include web based A&A, web based updates to the LDAP …

Don't miss

Cybersecurity news