Please turn on your JavaScript for this page to function normally.
Phishing attacks down in May

The percentage of phishing attacks decreased in May relative to other malware, according to threat statistics analysed by managed security company, Network Box.  Phishing …

22 suspected computer hackers arrested in France

According to French media reports, the 22 alleged hackers were arrested in Paris, southern and central France following a four month investigation involving over 90 members of …

Malware report: AdvancedXPFixer adware and Tixcet worm

PandaLabs reports this week about the adware AdvancedXPFixer, the Banbra.FTI Trojan and the Tixcet.A worm. AdvancedXPFixer is adware (a program designed to display adverts) …

The critical importance of Enterprise Rights Management

Anyone wondering why Enterprise Rights Management (ERM) is growing in importance need only review the news stories of the past few years. A US government consultant accesses …

Internet scheme used to steal micro-deposits

Michael Largent, 22, was arraigned on an indictment charging him with multiple counts of computer fraud, wire fraud, and mail fraud. This case is the product of an extensive …

Hardware encryption-secured flash drive

EDGE Tech Corp introduced its rough-and-tough, hardware encryption-secured flash drive, the DiskGO Secure GUARDIAN. Utilizing mandatory 256-bit AES hardware encryption, the …

Apple updates security with Mac OS X 10.5.3

The Mac OS X 10.5.3 Update is recommended for Mac OS X 10.5, 10.5.1, and 10.5.2 Leopard. It includes general operating system improvements that enhance the stability, …

Adobe Flash Player remote code execution vulnerability roundup – update #2

Adobe Flash Player contains an code execution vulnerability. An attacker may be able to trigger this overflow by convincing a user to open a specially crafted SWF file. The …

HNS Book giveaway: “The Future of Reputation: Gossip, Rumor, and Privacy on the Internet”

June 05 2008: The winner is Jeffry B. ———————————- We are giving one of our readers a copy of “The …

Insider threats keep IT directors awake at night

Secure Computing announced the results of an IT Director survey that uncovers a rising concern of insider threats and widespread acknowledgement of being unprepared for …

Preparations for secure collaboration in a de-perimeterized business world

Jericho Forum released the results of a spot survey of 22 IT security vendors that responded to questions about vendor preparedness to deliver security for today’s …

Full disk encryption for the Mac platform

Check Point announced the release of Check Point Full Disk Encryption for Mac OS X, the industry’s first full-disk encryption solution with pre-boot authentication to …

Don't miss

Cybersecurity news