The age of cyberwar
McAfee revealed the staggering cost and impact of cyberattacks on critical infrastructure such as electrical grids, oil and gas production, telecommunications and …
IE vulnerability offers your files to hackers
Jorge Luis Alvarez Medina, a security consultant working for Core Security, has discovered a string of vulnerabilities in Internet Explorer that make it possible for an …
Report warned about Google-like attacks
Could the attack on Google have been prevented or, at least, mitigated? The question arose when the existence of a report titled “Report on the Capability of the …
Rogue software details: PcSecureNet
PcSecureNet is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Phishing attacks account for more than one in two viruses
More than half (55.59 per cent) of all malware sent on email is an attempted phishing attack, according to analysis of malware in January 2010 by Network Box. Phishing attacks …
Facebook users alarmed by “Unnamed” application
A cleverly orchestrated campaign taking advantage of a “Unnamed app” that can be found in the Application Settings of some people’s Facebook account has been …
iPad SEO poisoning campaign leads to malware
Was there any doubt about the fact that cybercriminals would use THE hottest topic on the Internet at the moment to spread their malicious payloads? A SEO poisoning campaign …
E-passport flaw enables owner tracking
E-passports could be used to track their owners – British computer scientists warn. The Register reports that the possibility was revealed by Tom Chothia and Vitaliy …
Information security guidelines for the healthcare industry
SecureWorks recommends the guidelines outlined below. Security risk assessments Performing regular security risk assessments will give your organization a much better …
Splunk 4.0.9 released
Splunk released version 4.0.9 of the Splunk IT search and analysis engine. The following issues have been resolved in this release: Some issues related to high memory …
EFF researches Web browser tracking
Do you ever wonder what fingerprints your browser leaves behind as you surf the web? Peter Eckersley from the EFF comments: “Traditionally, people assume they can …
IronKey delivers mobile data security to government
IronKey and Carahsoft Technology announced that Carashsoft will distribute IronKey’s managed portable storage, authentication and trusted virtual computing solutions for …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military