Trojans that use a new form of attack with rootkits
PandaLabs has detected the appearance of Trojans that include rootkits (MBRtool.A, MBRtool.B, MBRtool.C, etc.) designed to replace the master boot record (MBR), -the first or …
Watch the trailer for “The New Face of Cybercrime” documentary
Security vendor Fortify Software will soon be premiering their documentary “The New Face of Cybercrime”. Follow the link provided above for registering to San …
Removal tool for DNSChanger Mac trojan
DNSChanger Removal Tool detects and removes latest spyware targeting Mac OS X. DNSChanger Trojan (also known as OSX.RSPlug.A Trojan Horse) attacks users attempting to play a …
A logic bomb lends a former systems administrator 30 months in prison
A former computer systems administrator for Medco Health Solutions, Inc. was sentenced to 30 months in federal prison for planting a “logic bomb” in Medco’s …
Microsoft improves Windows Sidebar protection
Microsoft released an update for currently supported editions of Windows Vista that will protect gadget users. Gadgets are mini-applications designed to provide the user with …
Verizon rolls out unified threat management service
To help companies around the world better defend against the rising number of security threats, Verizon Business will monitor and manage a range of products that combine …
New GateKeeper prevents leap-frogging to unauthorized areas
Xceedium announced the availability of Xceedium GateKeeper 4.0, which delivers patent-pending LeapFrog Prevention technology, FIPS 140-2, Level 2 certification and other new …
Video: Relay attacks on card payment – vulnerabilities and defenses
Relay attacks allow criminals to use credit or debit cards for fraudulent transactions, completely bypassing protections in today’s electronic payment systems. This talk …
Beta version of safeSEARCH v2.0 browser toolbar
CyberDefender’s safeSEARCH Toolbar v2.0 BETA is a free browser plug-in that offers an improved search experience while protecting personal information and ensuring …
Research and analysis of stealth Master Boot Record rootkit
In 2005 Derek Soeder and Ryan Permeh, researchers from eEye Digital Security, presented eEye BootRoot. The technique used in their project wasn’t new and had been …
Top threats and security trends for 2008
Security experts at AVG published their analysis of 2007’s top viruses, Internet hacks and exploits, and reveal their forecast for the top security threats facing …
Looking back at 2007’s top viruses
Viruses made up some 15 percent of the threat landscape in 2007. According to AVG global security strategist Larry Bridwell, the 10 viruses exhibiting the most staying power …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations