Greatest security threats to education
With education-related cyber-security threats expected to rise in 2010, WatchGuard is predicting the top threats facing schools, colleges and universities. Top threats …
A closer look at Trend Micro Internet Security 2010
Trend Micro Internet Security detects and removes viruses, spyware, and other threats from your computer, email, instant messages, and downloads, blocks untrustworthy links in …
Metasploit Framework 3.3.3 comes with exploit rankings
The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration …
Credit card provider suffers breach, personal data lost
MBNA, the UK’s largest credit card provider, has confirmed that a laptop containing the personal details of its customers has been stolen from one of its third party …
Is code auditing of open source apps necessary before deployment?
Following Sun Microsystems’ decision to release a raft of open source applications to support its secure cloud computing strategy, companies may be wondering if they …
FBI estimates losses of over $150 million to rogue anti-virus
Tthe Internet Crime Complaint Center, a partnership between the FBI and the National White Collar Crime Center (NW3C), reported that “the FBI is aware of an estimated …
Rogue software details: DataDoctor2010
DataDoctor2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
2010 data security trends: External attacks from the inside
Sentrigo announced its top data security trends to watch for in 2010. A new type of threat: External attacks from the inside Generally, companies have viewed attacks as either …
GnuPG 2.0.14 released
The GNU Privacy Guard (GnuPG) is GNU’s tool for secure communication and data storage. It can be used to encrypt data, create digital signatures, help authenticating …
Cyber criminals become their own ISPs
Hounded by law enforcement agencies and security experts, cyber criminals have been witnessing the ISPs and hosting providers of their botnets being shut down at a greater …
A closer look at Panda ActiveScan 2.0 – Free Antivirus
Panda’s ActiveScan is an online security solution that scans your computer for viruses, worms and Trojans, spyware and other Internet threats. It detects and eliminates …
Facebook clickjacking attack spreads
A new clickjacking attack has targeted Facebook users. It presents itself in the form of a comment on the users’ account looking like this: The photos are, obviously, …
Featured news
Resources
Don't miss
- Researchers unearth keyloggers on Outlook login pages
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps