Example of double spam sent to mailboxes and mailing lists
A way of double spamming – combo of spamming email users and mailing lists to get a profit: #1 Spammer sends a spam e-mail to a mailing list that doesn’t have …
Video: information security – before and after public-key cryptography
Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through the 20th century and into the 21st. In the 1970s, …
Guide for assessing the security controls in federal information systems
NIST recently released a draft Special Publication 800-53A, Guide for Assessing the Security Controls in Federal Information Systems. This final public draft provides …
Weekly report on viruses and malware X-mas edition
As for the most harmful malware strains this week, the list is headed by the Virtumonde spyware and the NaviPromo and VideoAddon adware.As for the new samples that appeared …
Bluetooth guardian for Series 60 phones
Symbian Guru released BT Guard – the security software which helps to protect the phone from unauthorized access via Bluetooth. BT Guard changes your Bluetooth status …
Virus almanac 2007
PandaLabs, Panda Security’s anti-malware laboratory, has drawn up this review of some of the more curious examples of malware that appeared in the second half of 2007. …
Trojan comes as codec, brings in many malware
It may come in an email asking you to check out a movie file. Or it may seek to push its way to your computer from malicious websites. In both cases a “codec’ will …
Dutch authorities apprehend 14 suspects in a phishing scam
IT security and control firm Sophos has welcomed news that Dutch authorities have arrested 14 suspects who allegedly allowed their ABN Amro bank accounts to be used by …
BSA urges congress to pass cyber crime legislation
 The Business Software Alliance (BSA) today urged Congress to swiftly enact cyber crime legislation that would update criminal laws to provide law enforcement with …
Forecast: How Internet threats will evolve in 2008
PandaLabs published a forecast on how Internet threats will evolve in 2008. One of the key factors will be the increase in the amount of malware, known and unknown, in …
Open Source Vulnerability Database 2.0
OSVDB announced a major milestone in the cataloging, classification, description and management of software and hardware security vulnerabilities – the release of OSVDB …
Qualys releases QualysGuard PCI 2.0
Qualys announced the availability of QualysGuard PCI 2.0, the second generation of its On Demand PCI Platform. It dramatically streamlines the PCI compliance process and adds …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)