Winter Solstice themed SEO poisoning leads to malware
Any occasion seems to be good lately to launch a SEO poisoning campaign. Zscaler reports that searching for information about the Winter Solstice (21st of December) has been …
The new cybersecurity czar is Howard Schmidt
Earlier today, on the official White House blog, it has been announced that the post of Cybersecurity Coordinator will be filled by Howard A. Schmidt, a well-known name in the …
Rogue software details: SecurityCentral
SecurityCentral is a rogue security application. In order to remove it, find out what files and registry entries to look for below. SecurityCentral will prevent execution of …
Adobe patches Flash Media Server
Critical vulnerabilities have been identified in Adobe Flash Media Server (FMS) 3.5.2 and earlier versions. The vulnerabilities could allow an attacker, who successfully …
Intel patches flaws in its Trusted Execution Technology
Invisible Things Lab – who specialize in system-level security – issued yesterday the results of their research in which they describe how flaws in Intel’s …
Tripwire’s top 5 IT security predictions for 2010
With increasingly stringent compliance mandates, the explosion in virtualization interest and adoption, demands for audit reporting, and a spike in security breaches, 2009 has …
7 smartphone security tips
Lookout, a mobile security startup, suggests seven tips to staying safe on your smartphone. Whether you use your smartphone for business or pleasure, securing the computer in …
A closer look at Kaspersky Anti-Virus for Mac 8.0.1.358
Kaspersky, the renowned software security company, has recently released an anti-virus solution for the Mac OS. It contains the company’s signature-based protection from …
Brittany Murphy’s death used for peddling rogue security software
It didn’t take long before cybercriminals seized the opportunity to use the death of actress Brittany Murphy to peddle malware. The most obvious choice was search engine …
Microsoft Security Update Guide
The Microsoft Security Update Guide was designed to help IT professionals better understand and use Microsoft security release information, processes, communications, and …
Looking back at malware in 2009
2009 was the year in which nobody that uses the Internet could afford not to educate him/herself about the dangers that lurk in the inbox, in Google’s search results, on …
Rogue software details: TheDefend
TheDefend is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Featured news
Resources
Don't miss
- Researchers unearth keyloggers on Outlook login pages
- Hackers love events. Why aren’t more CISOs paying attention?
- Before scaling GenAI, map your LLM usage and risk zones
- SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- Why banks’ tech-first approach leaves governance gaps