While information security has became the most important aspect for any form of business process, the mushrooming of vendors in …
Security expert worries about smart phone, TinyURL threats
It’s just that F-Secure’s chief security advisor doesn’t want people overlooking the other 29,999 malware files his company sees a …
Security Implications of the Humble Computer Clock
Is the clock on every computer system in your organization set to the correct time? If your answer is no, …
Koobface worm to users: Be my Facebook friend
A worm that hit Facebook last December has resurfaced, a security researcher said today, and is now hijacking user accounts …
Check Point overhauls its security software architecture
Check Point is in the midst of a major overhaul of its security software architecture so customers can pick and …
Mobile Phone Viruses on the Upswing
Viruses and spam attacks targeting mobile phone users are on the increase, says McAfee. According to the security firm's annual …
Hackers exploit unpatched Adobe Reader bug
Hackers have been exploiting a critical bug in Adobe Reader, the popular PDF-viewing software, for at least nine days, researchers …
9 Dirty Tricks: Social Engineers’ Favorite Pick-Up Lines
What the average guy might call a con is known in the security world as social engineering. Social engineering is …
Conficker worm gets an evil twin
The new variant, dubbed Conficker B++, was spotted three days ago by SRI International researchers, who published details of the …
Dangerous mobile phone viruses surge
Viruses and spam attacks targeting mobile phone users are on the increase, says McAfee. According to the security firm's annual …
Hackers jump on newest IE7 bug
Attackers are already exploiting a bug in Internet Explorer 7 that Microsoft Corp. patched just last week, security researchers warned …
Kaspersky releases AV prototype for Windows 7
The new technical prototype of Kaspersky Anti-Virus is designed to secure computers running under Windows 7. The beta test version …
With global effort, a new type of worm is slowed
There have been big computer worm outbreaks before, but nothing quite like Conficker . First spotted in November, the worm …
Cisco delivers security, storage, UC for small business
The products include security, storage and unified communications platforms (compare unified communications products) designed to be inexpensive and easy to …
Social networking sites a hotbed for cyber crime
The distribution of malware on social networking sites first occurred in small amounts towards the end of 2007, but that …
Barack Obama catches attackers fancy: Cyberoam report
Cyberoam announced the Q4 2008 email threat trend report, prepared in collaboration with its partner Commtouch. The main highlight of …
Fake sites spreading malware about Obama’s oath
Sites claiming President-Elect Barack Obama will refuse to take the oath of office Tuesday are serving up attack code believed …
Six worst Internet routing attacks
This list highlights the biggest security incidents involving the Internet's core routing protocol, the Border Gateway Protocol. Some of these …
AT&T Wireless Barrages Users with ‘Idol’ Ad
It looks like AT&T Wireless is in hot water for texting a large percentage of its customers, urging them to …
Browser bug could allow phishing without e-mail
A bug found in all major browsers could make it easier for criminals to steal online banking credentials using a …