Botnets, the ever-present threat
Every day, the M86′ Security Labs analyzes over 7 million distinct email messages, looking for patterns and emerging trends. In their recently published report covering …
Spybot.AKB worm spreads across P2P networks and e-mail
PandaLabs detected a new worm, Spybot.AKB, which spreads using P2P programs (copying itself to the usual shared folders with different names) and also via e-mail. What’s …
Massive ZeuS compromise discovered
NetWitness analysts have discovered a dangerous new ZeuS botnet affecting 75,000 systems in 2,500 organizations around the world. The newly-discovered infestation, dubbed the …
Imminent flood of smartphone malware?
As this year’s Mobile World Congress held in Barcelona, Spain, is coming to an end, a few important players in the security industry shared their thoughts about the …
Man gets 309 years in prison for identity theft
Robert Thompson, the leader of a massive identity theft and bribery scheme, was sentenced to 309 years in prison based on charges of conspiracy, wire fraud, mail fraud, bank …
Video: Cyber attack simulation
In the video below you can watch CNN’s Jeanne Meserve reports on the results a staged cyber attack.
Spam recycling: Why fix it if it ain’t broken?
Why take the trouble and waste the time for writing a new email, when the first one did so well? In the latest spam campaign hitting inboxes around the world, cyber criminals …
Finalists announced for the “Most Innovative Company at RSA Conference 2010” contest
RSA Conference announced the top 10 finalists for its “Most Innovative Company at RSA Conference 2010” contest. This half-day interactive program is devoted to …
12 tips to ensure company data is kept private
Companies must consider the implications of using free communications services (such as email and data hosting) on their data privacy. Network Box offers IT managers steps to …
Mock cyber attack shows US unpreparedness
During the simulated cyber attack that took place yesterday in Washington and was recorded by the CNN, one thing became clear: the US are still not ready to deflect or …
Global network of infected devices unearthed
While working on a project for the Ministry of Defense, a team of Czech researchers has discovered a global network of virus-infected devices that makes it possible to …
Permanent Stakeholders’ Group of top security advisors appointed
As of today, a new composition of 30 top security experts start their term of office as members of the Permanent Stakeholders’ Group (PSG), giving advice to the …
Featured news
Sponsored
Don't miss
- Organizations struggle to defend against ransomware
- Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)
- Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)
- Is an open-source AI vulnerability next?
- OWASP dep-scan: Open-source security and risk audit tool