Please turn on your JavaScript for this page to function normally.
Minimalist server monitoring

Anfibia Reactor is a web-based server monitoring solution that oversees the CPU, memory, battery, hard drives, makes sure network connections are working, checks databases, …

F-Secure protects Android users

F-Secure released Anti-theft for Mobile and Mobile Security, which includes the Browsing Protection feature, for smartphones on the Android platform. Today’s smartphones …

Rogue software details: Security Essentials 2010

Security Essentials 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Week in review: Aurora malware, cyber war games and 0-day vulnerabilities for sale

Here’s an overview of some of last week’s most interesting news and articles: Biggest Chinese hacker training site taken down Black Hawk Safety Net, which offered …

Hackers steal $50,000, bank refuses to assume responsibility

Fan Bao and his wife Cathy Huang from Highland Park, California, were shocked when they were notified of two fraudulent money orders that were set to transfer money in the …

Lawful wiretap interfaces accessible to cyber criminals?

The lawful intercept architecture in Cisco Systems’ networking products has been examined and found wanting by Tom Cross, manager of IBM’s X-Force research team. …

Rogue software details: MalwarePro

MalwarePro is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Chip and PIN system on banking cards seriously flawed

A team of Cambridge computer researchers has discovered a flaw in the chip and PIN system used on most – if not all – credit and debit cards around the world. The …

Fake AV’s double attack

Fake AV is regularly at the top of the lists of peddled malware, and part of the reason it’s because it is spread in a many different ways: spam, compromised websites, …

Simulated cyber attack will test US Government response

An article in The Atlantic with the title “U.S. To Be Hit By Massive Cyber Attack On Feb. 16. Asterisk.” has set some readers to panic mode because they assumed it …

Critical infrastructure is a primary cybercriminal target

Critical infrastructure such as energy, pharmaceutical and government assets are more than twice as likely to be targeted by cybercriminals than other organizations, according …

Hacking games: Key to finding cybersecurity talent

To catch a thief, you must think like a thief – the best way to defend an asset is to get inside the head of the attacker and predict his actions. That’s the …

Don't miss

Cybersecurity news