WordPress hacked, affected blogs point to malware site
A throng of blogs have been compromised and are pointing readers to a malicious website containing scripts that lead to a Trojan that drops and executes other malicious files. …
Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 available
Visual Studio 2010 and .NET Framework 4 have something for every developer. The new editor, now using Windows Presentation Foundation, supports concepts such as the use of …
Rogue software details: Antivirus Suite
Antivirus Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
New books: Windows Server 2008, Microsoft Forefront Threat Management Gateway
Windows Server 2008 Administrator’s Pocket Consultant, Second Edition includes coverage of Windows Server 2008 R2 enhancements, including Hyper-V with Live Migration, …
Week in review: Phone phishing, botnet monetization, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Insufficient employee security training for the cloud Despite …
Trojan disguised as Windows Mobile game
A “trojanized” pirated version of a 3D first-person shooter game for the Windows mobile platform found its way to some Windows Mobile freeware download sites and …
The botnet economy
It is somewhat difficult for us – the potential victims – to appreciate the effectiveness of the various botnets and to aknowledge that the botnet masters have …
XBox gamers, beware!
Various fake websites that purport to be hosting a XBox Live application have been detected by Sunbelt, but are actually intent on making you download and run a password …
Prevent unauthorized electronic fund transfers
Authentify released the ETF Verifier application which enables financial applications and payment platforms to alert legitimate account owners via phone whenever a new payee …
Bank employee accused of stealing from “infected” ATMs
An employee of the Bank of America that was in charge of designing and maintaining the the bank’s computer system and its ATMs, was charged of committing computer fraud. …
Does single sign-on have a future?
Single sign-on has been for a while now lodged into many IT minds as a potential ideal solution for the issue of the forever-piling sign-in credentials. As people are …
Malicious shortened URLs on IM
Shortened URLs are not just for Twitter – their small footprint also lends itself beautifully to Instant Messaging. Unfortunately, even cybercriminals are now privy to …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!