Fake Twitter email continues to plague inboxes, leads to malware
Almost a week ago, Twitter began warning its users about fake Twitter Support emails. Since then, a couple of variants of the email have surfaced, with small differences in …
The Storm botnet strikes again
Once upon a time, the Storm botnet was responsible sending out 20 percent of all spam, but was eventually crippled by the rise of new malicious software removal tools. By the …
India now the primary producer of viruses
India has pushed Korea into second place and taken over the mantle of the world’s largest producer of internet viruses, according to analysis of internet threats in …
The staggering cost of a data breach
The average cost of a data breach globally stood at USD 3.43 million last year, the equivalent of USD 142 per compromised customer record, according to research from the …
Rogue software details: Digital Protection
Digital Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Introduction to malware analysis
In this video, Lenny Zeltser will introduce you to the process of reverse-engineering malicious software. He will outline behavioral and code analysis phases, to make this …
In the security of mobile devices we trust, say users
The majority of mobile device users worldwide feel safe using their mobile devices for applications, including access online banking, according to research by Unisys. The …
GFI LANguard learning videos
GFI LANguard: Software Replacement In this video you see three tips on using GFI LANguard to replace an old piece of software, with a new application. GFI LANguard: Deploy GFI …
Entrust brings strong authentication to mobile devices
With the newest release of Entrust IdentityGuard, Entrust will add the innovative Entrust IdentityGuard Mobile application, which seamlessly authenticates consumer, corporate …
The US continues its reign as the king of spam
The United States continues its reign as the king of spam, relaying more than 13% of global spam, accounting for hundreds of millions of junk messages every day, according to …
New malicious PDF
A new type of malicious PDF file has recently been spotted in the wild. This one contains an malicious object that was embedded into the file through the use of common the …
Poisoned search results: Our daily reality
The biggest threat to search engines are not their competitors, but poisoned search results. Since the moment when search engines have largely become the starting point for …
Featured news
Resources
Don't miss
- The messy data trails of telehealth are becoming a security nightmare
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way