The threat of virus infected talking computers
If your computer starts talking to you and tells you that you are infected and your files have been deleted, it’s no joke, you have just been infected by the BotVoice.A …
Malware over real-time communications channels shows no sign of slowing
FaceTime Communications reported today that security incidents targeting public IM and P2P channels have increased by 5 percent in Q2 2007 compared with Q1 2007. In contrast, …
New Fujitsu secure 300GB 2.5″ portable external hard disk drive
Fujitsu today launched its new travel-ready and world’s highest capacity 2.5″ External Hard Disk Drive for the U.S. market. Featuring up to 300GB of storage space …
Digital trust essential to enterprise business prosperity
Since January 2005, there have been more than 150 million identity breaches in the U.S. alone, and there is a growing market exploiting online theft. The average credit card, …
Netsky.q returns to top of virus chart
NetSky.q, the all-time leader for 2004 and 2005, has returned to head the virus Top 20 for June, according to information security software vendor, Kaspersky Lab. Hot on its …
Financially motivated threats still the most frequent malware in June
According to PandaLabs, Trojans and adware accounted for 49.6% of infections detected by Panda ActiveScan in June. Trojans, which increased by 0.75% this month, caused 26.89% …
Watch out new iPhone users – anyone can listen to your voicemail
Altough this problem was found out more than a year ago, new users that are buying iPhones and migrating to AT&T/Cingular should know that their voicemails can be …
New malware exploits iPhone craze
Secure Computing warns that email spam, indicating that the recipient has won a new iPhone, is directing users to a malware hosting website. The have discovered a website that …
Authentication and encryption solution for Seagate 5400 Momentus FDE.2 drives
After two years of development SECUDE is pleased to announce the official release of FinallySecure 1.0 which provides total Data-at-Rest security for new hardware based Full …
Viruses that start music in Windows Media Player and read the infected text
This week’s PandaLabs malware report looks at three new malicious codes designed to compromise the security of computers: two worms and a Trojan. Gronev.A is a worm with …
New addition to the FlowThrough security processor family
Hifn announced the full availability and production of the 8450, the newest member to the company’s FlowThrough security processor family. Hifn’s FlowThrough …
Relaxation of PCI DSS is no surprise
The recent ease in requirements for UK retailers attempting to comply with the Payment Card Industry Data Security Standards (PCI DSS) did not surprise application security …
Featured news
Sponsored
Don't miss
- Ransom recovery costs reach $2.73 million
- What is cybersecurity mesh architecture (CSMA)?
- New SOHO router malware aims for cloud accounts, internal company resources
- Dropbox says attackers accessed customer and MFA info, API keys
- 2024 Data Breach Investigations Report: Most breaches involve a non-malicious human element