Among a slew of online cybercrime forums, Pay-Per-Install.org stands out as a malware flea market where shadowy pushers of Trojan …
Malware flea market pays hackers to hijack PCs
Among a slew of online cybercrime forums, Pay-Per-Install.org stands out as a malware flea market where shadowy pushers of Trojan …
Domain-name abuse proliferates
For legitimate businesses, a domain name is a way to hang a shingle in cyberspace. In the criminal world, domain …
Could Google be tricked into talking to botnets?
Cybercriminals could start to take advantage of the popularity of search engines like Google as vehicles for relaying malicious code …
Microsoft IE 8 shines in Web browser security test
Microsoft's Internet Explorer 8 rated tops among five browsers tested by NSS Labs for effectiveness in protecting against malware and …
Twitter withstands second DDoS attack in a week
Less than a week after Twitter was shuttered by a highly publicized distributed denial-of-service attack, the microblogging site was hit …
Symantec program sends security analysts to customer sites
Symantec widened its security support services with a program that places Symantec security experts on-site with enterprise customers to carry …
Microsoft to rush out emergency IE patch
Microsoft is taking the unusual step of rushing out two emergency security patches ahead of its regularly scheduled updates on …
Latest malware trick: outsourcing quality assurance
Creators of Waledac malware enlisted the Conficker botnet as a tool to spread malware of their own, marking the first …
Web threats soars in Threatscape Report by Fortinet
Fortinet announced that its June 2009 Threatscape Report showed dominance and significant growth in Web threat traffic, marked by increased …
Security group converges to fight Internet abuse
As cybercrime continues to proliferate on the Internet, one industry security group is hoping its work will help stem the …
McAfee offers its new vision for network security
McAfee today outlined details of its network security strategy, which integrates McAfee’s complete network security suite, including network firewalls, intrusion …
On a strong footing
How differently are your integrated suites targeted and positioned for corporate networks as against point solutions? Kaspersky Open Space Security …
Parabon launches grid-based DDoS attack tests
Distributed denial of service (DDoS) attacks of the kind that crippled networks in Estonia two years ago are hard to …
Attackers exploit Twitter , Myspace, Facebook
Cyberoam announced the Q1 2009 email threat report, in collaboration with partner Commtouch. While Conficker worm took the limelight, a …
Conficker on April 1st: Eve of destruction or big joke?
Security experts say Conficker.C (also called Downadup) presents a serious threat. Infected machines — said to number from 3 million …
Deep computer-spying network touched 103 countries
A 10-month cyberespionage investigation has found that 1,295 computers in 103 countries and belonging to international institutions have been spied …
In poor economy, IT pros could turn to e-crime
Enterprises increasingly worry that their employees may be more willing to steal data or sell insider knowledge because of the …
China becoming the world’s malware factory
With China's economy cooling down, some of the country's IT professionals are turning to cybercrime, according to a Beijing-based security …
Establishing End to End Trust
It is not an overstatement to say that the Internet has transformed the way we live. Social networking represents the …