Employee-owned mobile devices are riskiest
More than half of information technology leaders in the US believe that any employee-owned mobile device poses a greater risk to the enterprise than mobile devices supplied by …
26 trojanized apps pulled from Android Market
26 applications containing a variation of the DroidDream Trojan have been found on the official Android Market and are believed to have been downloaded by at least 30,000 …
The most active first quarter in malware history
With six million unique samples of recorded malware, Q1 2011 was the most active first quarter in malware history, according to McAfee. The report revealed many of the trends …
Facebook users targeted with OS aware fake AV attack
Fake AV peddlers have begun using Facebook to drive traffic to the malicious site that tries to trick users into believing their computer is infected. With subject lines like …
Wireshark 1.4.7 released
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following vulnerabilities have been fixed: …
Social networking safety tips for kids
“Many parents are rightfully concerned about their kid’s participation in social networks. There are a number of areas to be concerned with. Who are the kids …
Apple includes malware removal in security update
Apple just released Security Update 2011-003 which can be downloaded and installed via Software Update preferences, or from Apple Downloads. This is a small update weighing …
Romanian president declared dead by e-mail scam
BitDefender discovered a spam wave using the Romanian president’s image to help spread malware. The unsolicited e-mail relies on a classic combination of social …
Spam rate increases, growth expected to continue
Compared to the previous month, the amount of spam in email traffic increased by 1.2 per cent and averaged 80.8 per cent, according to Kaspersky Lab’s most recent …
Iran aims to exchange the global Internet for a national one
The Iran government is increasingly unsatisfied with the influence the Internet is exercising on the country’s citizens despite its censorship efforts and is planning on …
Encrypt files on Mac with BestCrypt
Jetico announced that their popular BestCrypt Container Encryption software now offers full compatibility with Mac computers. The software delivers data protection. Selected …
Data center IT departments fear targeted attacks
IT departments are now turning to virtualization, with half of the respondents having either implemented or are planning to deploy private clouds, according to a McAfee study. …