New trojan horse uses Shockwave video
Sophos is warning computer users about a Trojan horse that disguises its malicious intent by playing a humorous animation. The Agent-FWO Trojan horse plays the popular …
Trojan in a fake Microsoft security bulletin
Sophos is warning users of a widespread attempt to infect email recipients by sending a warning about a bogus Microsoft security patch. The emails, which have the subject line …
PCI compliance and vulnerability scanning suite for just $99
Research published recently within the security industry confirms that, while PCI is important, it is only one part of a larger vulnerability management framework for …
API for OpenSSL developers to add elliptic curve cryptography to their applications
Certicom announced Security Builder API for Open Source to help OpenSSL developers easily add elliptic curve cryptography (ECC) to their applications. The SSL shim, or …
“Mind Games” – a psychology study on cyber criminals
In the study titled “Mind Games,” the primary author, Dr. James Blascovich, Professor of Psychology at the University of California, Santa Barbara, offers analyies …
Log-on to Windows computers with your fingerprint
IOGEAR just released Personal Security Mouse with Nano Technology (GMEFP1W6), a solution offering fingerprint scan to log-in to a computer Additional features include file / …
Season of security product beta testing contests
A couple of days ago we covered BitDefender’s new beta testing program where breaking their software could get you techie gear such as Sony Playstation 3, Microsoft …
Spammers deflate Pump and Dump spam tactics
According to the security provider Marshal, pump ‘n dump spam has dropped significantly. Stock spam now represents five percent of all spam compared to 50 percent in …
New Trend Micro security enhancement package for Windows Vista
Trend Micro today announced the availability of Trend Micro OS Protection, a security enhancement package for Windows Vista users running Trend Micro Internet Security. This …
Poison Ivy can take over your computer
The malware named PoisonIvy.r comes into computers through various online utilities, dubious software programs and movie downloads from infected websites. MicroWorld experts …
A closer look at Eraser, a secure data removal tool
Eraser is a secure data removal tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with carefully selected patterns. …
Dirty duo guilty of obscene spam act
Jury convicts two men on multiple charges including fraud and transportation of obscene materials IT security and control firm Sophos has welcomed news that two men have been …
Featured news
Resources
Don't miss
- What GPT‑5 means for IT teams, devs, and the future of AI at work
- Microsoft urges admins to plug severe Exchange security hole (CVE-2025-53786)
- SonicWall: Attackers did not exploit zero-day vulnerability to compromise Gen 7 firewalls
- Photos: Black Hat USA 2025
- Beyond PQC: Building adaptive security programs for the unknown