Threats

Video of Emma Watson Nude Links to Malware

Zscaler researchers are warning of a link to a video claiming to show actress Emma Watson naked, which instead leads to malware."But unfortunately for all those who fell for the lure, a click on the...

Spear Phishing Quickly Coming of Age

by Jovi Bepinosa Umawing of GFI SoftwareWhen RSA’s executive chairman Art Coviello broke the news in March that his company’s SecurID two-factor authentication products had been compromised by a the...

Duqu, Stuxnet and the World of Cyber Espionage

In 2010, the Stuxnet malware gained global notoriety as a weapon of cyberwar against Iran. A new derivative of Stuxnet, dubbed "Duqu" is now making the rounds, though its purpose and target are not ...

Anonymous Hackers Hit Child Porn Web Sites

Members of Anonymous claim to have taken down more than 50 child pornography Web sites and leaked the names of more than 1,500 members of one of the sites."The Anonymous ca...

How Hackers Can Benefit IT Security

The word "hacker" is often misconstrued to be a bad thing, though that's not always accurate. That was the message delivered by security researcher Joe Grand at the SecTOR security conference today ...

Air Force Calls Malware Infection a ‘Nuisance’

The U.S. Air Force has stated that a recent malware infection of its drone fleet was only a "nuisance" and never a real threat."The Air Force also clarified that the malware was not a keylogger, but...

U.S. Drone Fleet Infected with Malware

A keylogging virus has infected the computers that control U.S. Predator and Reaper drones."The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not preve...

Siege Warfare in the Cyber Age

When people hear the words "cyber war," they've been conditioned to think of national secrets being stolen and catastrophic damage to vital public infrastructure. Over recent months many technical d...

Nexpose 5 Goes After Virtual Security

  As applications increasingly move to virtualized environments, the need for security solutions that examine virtual applications continues to grow. Security ...

Trend Micro Endpoint Security Review

Trend Micro is one of the "big four" business endpoint security vendors, along with Symantec, McAfee and Kaspersky. Its offering comes in two versions: a standard one, calle...

Latest articles