GFI Backup 2010 – Business Edition released
GFI Software released GFI Backup 2010 – Business Edition, suited for IT administrators who want to create a single backup/restore task and apply it across the entire …
Death of Type O Negative frontman used for Fake AV distribution
The rumor of the death of Peter Steele, Type O Negative frontman, has spread like wildfire through the Net yesterday. Confirmed by a number of sources, the unfortunate event …
New Zbot malicious campaign
A spam email purporting to come from UK’s Royal Mail service has been making the rounds of inboxes: Attached to the message is a .pdf file by the name …
Google on Fake AV
“For years, we have detected malicious content on the web and helped protect users from it,” says Niels Provos, an engineer from the company’s Security Team, …
Facebook builds up its defenses
The redesign of its Safety Center is just one of the steps Facebook is lately taking to tackle the security issues that have been steadily rising along with the number of …
Nessus 4.2.2 released
The Nessus vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and …
Little-known Java feature exploited in-the-wild
A recently unearthed feature that has been built into Java since Java 6 Update 10 allows developers to easily distribute their applications to end users. Unfortunately – …
5 ways to protect against cloud security threats
Stonesoft has identified five ways that organizations can improve cloud computing security. This announcement comes on the heels of recent research from Gartner citing that 60 …
Fireshark: Linking the malicious web
Fireshark is a tool, made up of a Firefox plugin and a set of postprocessing scripts that allows you to capture web traffic from the core of your web browser, enabling you to …
Spammers use the familiar to inspire action
Spammers have become adept at using the most familiar Internet names to give deceptive legitimacy to the billions of emails that they send. For example, between five to ten …
The U.K. Digital Economy Act: What you need to know
The various provisions of the U.K. Digital Economy Act have been publicly and privately debated for months. The public outcry against the most draconian ones failed to make an …
Apple releases MobileMe Backup 3.2
The Backup 3.2 update improves the overall reliability of Backup and uses space more efficiently on your iDisk or local storage by automatically recycling older backup data. …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity