Video: User Account Control in Windows Vista
Jason Fossen, an instructor at the SANS Institute, discusses the controversial User Account Control in Windows Vista.
Price list: trojans, password stealers, spam servers
Just over a thousand dollars can buy a cyber-crook the tools needed to turn malicious action into financial profit, according to data from PandaLabs. This is thanks to a black …
The state of data security in North America
RSA announced the results of a survey commissioned by RSA entitled “The State of Data Security in North America.” Conducted by Forrester Consulting, the survey …
New web security and web filtering solutions for small businesses
GFI Software announced the release of the latest version of GFI WebMonitor for ISA Server, a solution that gives administrators comprehensive control over corporate web usage …
MSN worm with downloader functionality
The most important malware samples analyzed by PandaLabs this week are the MSNHorn.A and Nugache.M worms, and the Legmir.ASG Trojan. MSNHorn.A spreads through MSN Messenger by …
Video explaining Zhelatin/Storm Gang’s activities
The Zhelatin/Storm Gang has been very busy lately. Their spamming tactics have changed from sending an attachment to sending a link that directs recipients to an IP Address. …
CORE GRASP for PHP – detecting and blocking injection vulnerabilities
CORE GRASP for PHP is a web-application protection software aimed at detecting and blocking injection vulnerabilities and privacy violations. As mentioned during its …
AOL identity thief faces seven year jail sentence
Sophos is reminding computer users of the threat posed by phishers following the conviction of a 23-year-old identity thief who targeted users of AOL. Michael Dolan, formerly …
Gang of four charged in joss-stick worm case
Li Jun, Wang Lei, Zhang Shun and Lei Lei are facing charges in a people’s court in Hubei Province in connection with the creation and distribution of the Fujacks worm. …
Hot Summer Book Giveaway – Winners announced
The lucky winners in our “Hot Summer Book Giveaway” are: 1) Lennox B. – “Security Metrics” 2) Mathew L. – “The Art of Software …
2008 promises exceptional demand for professional certification
(ISC)2 has expanded its global education offerings to support the next phase of Department of Defense (DoD) Directive 8570.1 — a phase that will involve an unprecedented …
2/3 of people worried about information shared on Facebook
Research conducted by IT security and control firm Sophos has revealed that fifty percent of workers are being blocked from accessing Facebook by their employers who are …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations