Please turn on your JavaScript for this page to function normally.
GFI Backup 2010 – Business Edition released

GFI Software released GFI Backup 2010 – Business Edition, suited for IT administrators who want to create a single backup/restore task and apply it across the entire …

Death of Type O Negative frontman used for Fake AV distribution

The rumor of the death of Peter Steele, Type O Negative frontman, has spread like wildfire through the Net yesterday. Confirmed by a number of sources, the unfortunate event …

New Zbot malicious campaign

A spam email purporting to come from UK’s Royal Mail service has been making the rounds of inboxes: Attached to the message is a .pdf file by the name …

Google on Fake AV

“For years, we have detected malicious content on the web and helped protect users from it,” says Niels Provos, an engineer from the company’s Security Team, …

Facebook builds up its defenses

The redesign of its Safety Center is just one of the steps Facebook is lately taking to tackle the security issues that have been steadily rising along with the number of …

Nessus 4.2.2 released

The Nessus vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and …

Little-known Java feature exploited in-the-wild

A recently unearthed feature that has been built into Java since Java 6 Update 10 allows developers to easily distribute their applications to end users. Unfortunately – …

5 ways to protect against cloud security threats

Stonesoft has identified five ways that organizations can improve cloud computing security. This announcement comes on the heels of recent research from Gartner citing that 60 …

Fireshark: Linking the malicious web

Fireshark is a tool, made up of a Firefox plugin and a set of postprocessing scripts that allows you to capture web traffic from the core of your web browser, enabling you to …

Spammers use the familiar to inspire action

Spammers have become adept at using the most familiar Internet names to give deceptive legitimacy to the billions of emails that they send. For example, between five to ten …

The U.K. Digital Economy Act: What you need to know

The various provisions of the U.K. Digital Economy Act have been publicly and privately debated for months. The public outcry against the most draconian ones failed to make an …

Apple releases MobileMe Backup 3.2

The Backup 3.2 update improves the overall reliability of Backup and uses space more efficiently on your iDisk or local storage by automatically recycling older backup data. …

Don't miss

Cybersecurity news