Relentlessly annoying banking Trojan
The majority of banking trojans prefers to hide in the deepest recesses of your computer and silently steal your login credentials. But CA’s researchers recently came …
SQL injection attack show-and-tell
SQL injection has, for a long time now, found its way to the top places of the list of favorite attack vectors of cyber criminals. Its popularity is, without a doubt, due to …
Microsoft cripples the Waledac botnet
A few days ago, Microsoft has requested and was granted a temporary restraining order that resulted in the takedown of 273 Internet domains that are believed to belong to …
Mobile workforce shift will cause security headache
A recent iPass report highlights the rising numbers of workers are moving to a truly mobile working environment confirms what many in the IT security industry have suspected …
Cloud based Web application security assessment
Cenzic released ClickToSecure Cloud, a self-service, completely cloud based Web application security assessment solution. With this new cloud platform, Cenzic has created open …
Pros and cons of biometric authentication
In theory, biometrics are a great way to authenticate a user: it’s impossible to lose your fingerprint (barring the most gruesome of developments), you can’t …
International Secure Systems Development Conference
The International Secure Systems Development Conference, taking place in London during May 2010, addresses the key issues around designing-in security for standard and …
The future doesn’t look bright for Google in China
Google’s announcement that it will leave China if the censoring of their search results continues seems not to have affected the Chinese government much. They have not …
How to avoid rogue security software
What can you do to help prevent the spread of rogues and make sure that rogue software vendors stop profiting from their unscrupulous business? Follow these tips below to tell …
Cryptome.org shut down for exposing MS surveillance guide
Cryptome, the whistleblower site that serves as a repository for “documents for publication that are prohibited by governments worldwide, in particular material on …
SEO poisoning reaches a new level
To improve the chances of installing their malware on random computers, scareware peddlers have decided to set up more that 60 websites that contain hundreds of possible …
Attackers focusing on capturing personal data
Online criminals are garnering greater success with increased technical sophistication affecting a wider range of industries. With greater diversity and the use of targeted …
Featured news
Sponsored
Don't miss
- Core security measures to strengthen privacy and data protection programs
- Ransomware statistics that reveal alarming rate of cyber extortion
- Key questions to ask when tailoring defensive stacks
- May 2024 Patch Tuesday: Microsoft fixes exploited zero-days (CVE-2024-30051, CVE-2024-30040)
- Apple backports iOS zero-day patch, adds Bluetooth tracker alert