Demonstration of Facebook account credentials theft
When you use a computer other than your own, you have to be especially careful about what online accounts you access – particularly if the computer in question is in a …
Money mules wanted
Reading about people unwittingly becoming money mules for cybercriminals, a lot of people wonder if they would be able to spot if the offer they received or searched for is …
Analyze the network behavior of unknown malware samples
The aim of the INetSim project is to perform a quick run-time analysis of the network behavior of unknown malware samples in a laboratory environment. Modules for the …
Rogue software details: AKM Antivirus 2010 Pro
AKM Antivirus 2010 Pro is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Continued growth of rogue antivirus activity
Sunbelt Software announced the top 10 most prevalent malware threats for the month of April 2010. The list of detections for April is little changed from March with the …
PortalProtect 2.0: Web threat protection, content-filtering and data loss prevention
Trend Micro PortalProtect 2.0 supports the Microsoft SharePoint 2010 platform and is backed by the Trend Micro Smart Protection Network infrastructure which scans, filters and …
Open source software for cloud services deployment
Cloud.com announced CloudStack, an open source software solution that accelerates the deployment, management and configuration of multi-tier and multi-tenant private and …
Detect and mitigate DNS security threats with ActiveTrust DNS
Internet Identity (IID) released ActiveTrust DNS, designed to detect, diagnose and mitigate DNS security threats. By hijacking DNS translations, attackers can drive …
SonicWALL SSL VPN 4.0 released
The SonicWALL SSL VPN 4.0 firmware release brings new features including a Web Application Firewall, Virtual Assist and simplified unified policy. Designed to enable …
New Yahoo! Messenger worm spotted
You’ve have all probably been already told a hundreds of times to be careful when clicking on links in unsolicited emails and messages. But, what you also need to know …
Enhance applications with digital signing and encryption functions
EldoS released a new version of SecureBlackbox. New offerings such as secure operations with cloud storages and office document security will help developers create software …
Webroot adds vulnerability scanning to cloud-based web security service
Webroot introduced a vulnerability scanner delivered in the cloud as part of a Web security software-as-a-service (SaaS) model. The new service offers weekly and monthly tests …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)