Please turn on your JavaScript for this page to function normally.
AOL identity thief faces seven year jail sentence

Sophos is reminding computer users of the threat posed by phishers following the conviction of a 23-year-old identity thief who targeted users of AOL. Michael Dolan, formerly …

Gang of four charged in joss-stick worm case

Li Jun, Wang Lei, Zhang Shun and Lei Lei are facing charges in a people’s court in Hubei Province in connection with the creation and distribution of the Fujacks worm. …

Hot Summer Book Giveaway – Winners announced

The lucky winners in our “Hot Summer Book Giveaway” are: 1) Lennox B. – “Security Metrics” 2) Mathew L. – “The Art of Software …

2008 promises exceptional demand for professional certification

(ISC)2 has expanded its global education offerings to support the next phase of Department of Defense (DoD) Directive 8570.1 — a phase that will involve an unprecedented …

2/3 of people worried about information shared on Facebook

Research conducted by IT security and control firm Sophos has revealed that fifty percent of workers are being blocked from accessing Facebook by their employers who are …

File containing confidential data from 30,000 users

A version of Apophis, a tool used by cyber-crooks to handle information stolen from users infected by several variants of the Nuklus family of Trojans, stores data belonging …

Windows patch updates blamed for Skype problems?

Although a Russian security forum speculated about a possible exploit that caused major problems for the Skype network, Skype announced the following: “On Thursday, 16th …

Secure USB 2.0 drives with hardware-authentication lock

Corsair launched the “Flash Padlock” family of affordable USB 2.0 drives, the safest way to secure your data while on the go. Priced starting at only $29.99 USD …

Latest malware threat roundup and forecast PDF report

Trend Micro today published the TrendLabs Semi-annual Threat Roundup and Forecast. Analyzing malware trends that influence the economic growth of the malware world, the report …

New book – “Securing Ajax Applications”

Securing Ajax Applications covers basic security techniques and examines vulnerabilities with JavaScript, XML, JSON, Flash, and other technologies. Wells, also, clearly and …

Computer Forensics Library Boxed Set

“Computer Forensics Library Boxed Set” includes three previously published books: “Forensic discovery” (020163497X): Definitive guide that presents a …

Worm with SMTP and dialer engine

The focus of this week’s PandaLabs report are RegisteredLetter.A worm and ZLFake.A backdoor. RegisteredLetter.A is designed to make a series of changes on infected …

Don't miss

Cybersecurity news