Spammed screensaver installs rootkits and trojan
Sophos is warning of a widespread email spam campaign that poses as a screensaver, but is actually designed to install rootkits and a Trojan horse on infected Windows PCs. The …
PayPal data stealing trojan and IcePack malware installer
PayRob.A is a Trojan designed to steal data from PayPal accounts. Like most Trojans, PayRob.A cannot spread by itself, but needs intervention from a malicious user to reach …
New book: “Fuzzing: Brute Force Vulnerability Discovery”
Fuzzing has evolved into one of today’s most effective approaches to test software security. To “fuzz,” you attach a program’s inputs to a source of …
Malicious tool Icepack installs malware through exploits
PandaLabs has discovered a new malicious tool that installs malware through exploits. This tool is called Icepack and is sold on the Internet for US$400. This tool joins …
New book: “Network Warrior”
Network managers looking to work smarter and improve their job performances will find the useful, real-world tools they need in Gary Donahue’s new book, Network Warrior …
Email spam attachments decreasing
BitDefender labs have determined that the number of spam messages sent to recipients with PDF attachments has recently decreased. Their researchers believe this decrease can …
Uniloc security platform leverages power of Oracle Database 11g
Uniloc USA announced interoperability of the company’s flagship product lines, softANCHOR and netANCHOR, with Oracle Database 11g. Leveraging Oracle, the number one …
Threat Report: Record number of Web-borne attacks during 2007
Sophos has published new research into the first six months of cybercrime in 2007. The Sophos Security Threat Report examines existing and emerging security trends and has …
Very fast automatic spam tool sold for $450
PandaLabs has discovered XRumer, a tool designed to post spam and links pointing to web pages infected by malware on forums, websites, blogs, etc. It is sold in different …
Hot Summer Book Giveaway
This giveaway is made possible by the fine folks at Addison-Wesley Professional and Cisco Press. We are giving away one copy of each of these books: To try your luck send an …
New book “Virtual Honeypots: From Botnet Tracking to Intrusion Detection”
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, …
HTTPS/SSL content filtering for SMB and education
Cymphonix announced the upcoming availability of Network Composer Version 8, the latest release of its award-winning secure web gateway appliance. The latest firmware …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems