Please turn on your JavaScript for this page to function normally.
Top vulnerable applications in 2009

Bit9 unveiled its annual report on the top popular consumer applications with known vulnerabilities. The list, published in the research brief is created for IT professionals, …

Malware trends in 2009

MessageLabs released their 2009 Annual Security Report, and here is what they have to say about the malware that plagued us in the passing year. 1 of every 286.4 emails …

Guide to online safety in 2010

The online consumer is more vulnerable than ever thanks to focused cyber crime tactics. In order to make online security a priority, MessageLabs says it’s best to watch …

Rogue software details: SafetyAntiSpyware

SafetyAntiSpyware is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Companies use insecure technology for critical information transfers

With global organizations depending on the sharing of sensitive information to support everything from financial transactions to patient care records, many believe they are …

Firefox 3.5.6 fixes several security issues

Mozilla released Firefox 3.5.6 that fixes several security issues. Privilege escalation via chrome window.opener Security researcher David James reported that a content window …

New book: “Hacking: The Next Generation”

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers …

Analysis of 1 billion spam messages

Project Honey Pot, an international community of web and email administrators that joined their forces to track and stop online fraud and abuse, has decided it was time to …

High-performing DNS caching software

Secure64 Software released Secure64 DNS Cache, a high-performing DNS caching solution that offers the protection against cache poisoning attacks. “Continually rising …

Fake DHL delivery notice preys upon holiday shoppers

Holidays, a time for giving and receiving. You ordered stuff online, and are waiting for it to be delivered. You get an email. It’s from DHL (or so it seems). You open …

A closer look at Spyware Terminator 2.6.5.111

Spyware Terminator is a free spyware remover that monitors your computer for both known and unknown spyware. The known spyware can be detected and identified during the scan, …

Top 10 security predictions for 2010

Michael Sutton, VP of security research at Zscaler outlined the following security predictions for 2010. Apple is forced to climb the security learning curve Apple has for …

Don't miss

Cybersecurity news