Barack Obama Sex Video malware attack video
In this video Sophos describes how hackers are sending out malicious spam emails, trying to infect internet users with the lure of a sex video of presidential candidate Barack …
Spam stats for August: origins, categories and percentage
Worldwide Internet Mail Gateway Spam Percentage represents the number of messages that were processed and classified as spam versus the total number of messages processed when …
New Defiance Suite with enchanced mainframe data protection capabilities
Protegrity Corporation released Defiance Security Suite 4.5, the latest version of its award-winning data protection solution. The company broadens its mainframe data …
Partnership with Adobe for advanced electronic signature of documents
European electronic signature solutions provider Cryptolog has announced that it has signed a partnership agreement with Adobe to provide technology permitting the advanced …
Malware claims UK suffers nuclear explosion
Sophos has discovered a widespread spam campaign that claims that a powerful explosion occurred at a nuclear power station located in the suburbs of London on the afternoon of …
91% of organizations perceive cybercrime as a major business risk
Finjan announced the findings of its Web security survey of 1387 IT/Security professionals conducted during July 2008. The results reveal that an overwhelming number of …
Malware that creates fake YouTube pages for infecting users
PandaLabs has detected YTFakeCreator, a program used by cyber-crooks to create fake YouTube pages to infect users with malware. The infection method is as follows: …
Mac OS X privacy software gets an update
Mireth released a new 4.2 version of NetShred X, their easy to use internet track eraser that erases internet tracks, such as cache, history and email. NetShred X runs on Mac …
Briefing on the upcoming Smart Cards in Government Conference
The 7th Annual Smart Cards in Government Conference (October 22 – 24, 2008)will look at the industry challenged with meeting a new administration’s timetable and …
New book: “Programing .NET 3.5”
Programming .NET 3.5 offers a grand tour of the release, describing how the four principal technologies can be used together, with Ajax, to build modern n-tier and …
Disaster recovery for Windows Server 2008 Hyper-V
The need for virtual server protection is increasing as IT organisations consolidate workloads using virtualisation software. Further magnifying this need is market research …
Forensic watermarking and DRM/CAS technologies
Medialive launched a new SDK product range: m2mark, which features a highly secure approach to merging forensic watermarking and DRM/CAS technologies. The solution integrates …
Featured news
Resources
Don't miss
- Signal blocks Microsoft Recall from screenshotting conversations
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech
- Lumma Stealer Malware-as-a-Service operation disrupted
- Data-stealing VS Code extensions removed from official Marketplace