Basic security measures do wonders
Deep down inside, we all wish for a unique solution that will protect our machine or our network completely forever and ever, preferably one that can be activated with a …
Twitter tackles phishing problem
In a bid to obstruct the phishing onslaught that has lately been targeting its users, Twitter has announced that it will rout the submitted direct messages through a new URL …
Online banking rip-offs go up, card fraud goes down
Losses due to credit and debit card fraud have fallen for the first time in 3 years, says the UK Cards Association, only to be supplanted by a rising incidence of phishing …
9 million ZeuS attacks blocked in the last 6 months
Trend Micro has seen a recent rise in average of around 300 unique ZeuS samples per day, according to a recent threat report that examines the Eastern European criminal …
Human exploit attacks surpass the software flaw approach
Barracuda Labs released its annual report for 2009, in which they highlight the shifts in Internet user behavior and the resulting attacker trends. Twitter Throughout 2009, …
And the winner is – FakeAV!
Taking advantage of the Oscar fever, criminals have poisoned search results regarding the award ceremony. Entering “oscar winners live 2010” you get this: …
Eight vulnerabilities fixed, one IE 0-day warning for Patch Tuesday
After last month’s mammoth Patch Tuesday release, administrators will be glad to know that this month Microsoft delivers only 2 bulletins that fix 8 vulnerabilities …
UK threatens to retaliate over cyber attacks
Rapidly approaching the point when retaliation against countries suspected of launching cyber attacks and engaging in cyber espionage will be ordered, the UK …
Log review checklist for security incidents
Anton Chuvakin, the well-known security expert and consultant in the field of log management and PCI DSS compliance and author of many books, and Lenny Zeltser, leader of the …
Email security trends
Proofpoint announced findings from a survey of 122 RSA Conference 2010 attendees, conducted at its exposition booth, about email security trends. Key findings from the survey …
Remote access app for iPhone and iPod touch
TeamViewer released TeamViewer and TeamViewer Pro iPhone. Designed for iPhone or iPod touch, from versions 2.2.1 and newer, the applications access or control remote Windows …
Mariposa bot distributed by Vodafone’s infected phone
Following yesterday’s news about the Energizer DUO USB recharger that infects PCs with a Trojan, here is another piece of equipment whose software comes bundled with …
Featured news
Resources
Don't miss
- Why AI code assistants need a security reality check
- GPS tracker detection made easy with off-the-shelf hardware
- 91% noise: A look at what’s wrong with traditional SAST tools
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)