Most malicious websites are hosted in the US
AVG Technologies unveiled the results of a research study which shows that – contrary to popular opinion – most malicious websites are hosted on US servers and not …
Basic security measures do wonders
Deep down inside, we all wish for a unique solution that will protect our machine or our network completely forever and ever, preferably one that can be activated with a …
Twitter tackles phishing problem
In a bid to obstruct the phishing onslaught that has lately been targeting its users, Twitter has announced that it will rout the submitted direct messages through a new URL …
Online banking rip-offs go up, card fraud goes down
Losses due to credit and debit card fraud have fallen for the first time in 3 years, says the UK Cards Association, only to be supplanted by a rising incidence of phishing …
9 million ZeuS attacks blocked in the last 6 months
Trend Micro has seen a recent rise in average of around 300 unique ZeuS samples per day, according to a recent threat report that examines the Eastern European criminal …
Human exploit attacks surpass the software flaw approach
Barracuda Labs released its annual report for 2009, in which they highlight the shifts in Internet user behavior and the resulting attacker trends. Twitter Throughout 2009, …
And the winner is – FakeAV!
Taking advantage of the Oscar fever, criminals have poisoned search results regarding the award ceremony. Entering “oscar winners live 2010” you get this: …
Eight vulnerabilities fixed, one IE 0-day warning for Patch Tuesday
After last month’s mammoth Patch Tuesday release, administrators will be glad to know that this month Microsoft delivers only 2 bulletins that fix 8 vulnerabilities …
UK threatens to retaliate over cyber attacks
Rapidly approaching the point when retaliation against countries suspected of launching cyber attacks and engaging in cyber espionage will be ordered, the UK …
Log review checklist for security incidents
Anton Chuvakin, the well-known security expert and consultant in the field of log management and PCI DSS compliance and author of many books, and Lenny Zeltser, leader of the …
Email security trends
Proofpoint announced findings from a survey of 122 RSA Conference 2010 attendees, conducted at its exposition booth, about email security trends. Key findings from the survey …
Remote access app for iPhone and iPod touch
TeamViewer released TeamViewer and TeamViewer Pro iPhone. Designed for iPhone or iPod touch, from versions 2.2.1 and newer, the applications access or control remote Windows …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)