Threats

Researchers Warn of Python Trojan

Researchers have discovered what appears to be the first Trojan targeting the Python...

U.S. Drone Fleet Infected with Malware

A keylogging virus has infected the computers that control U.S. Predator and Reaper drones."The virus, first detected nearly two weeks ago by...

Anonymous Hackers Launch Analytics Web Site

Members of Anonymous recently launched a Web site, called Anonymous Analytics, which is...

Siege Warfare in the Cyber Age

When people hear the words "cyber war," they've been conditioned to think of national secrets being stolen and catastrophic damage to vital...

Betfair Acknowledges Cyber Attacks

Online gambling company Betfair recently acknowledged that it was the victim of cyber...

Nexpose 5 Goes After Virtual Security

As applications increasingly move to virtualized environments, the need for security solutions...

Trend Micro Endpoint Security Review

Trend Micro is one of the "big four" business endpoint security vendors, along...

Operation Shady RAT Pointing the Way

Cyber-criminals will inevitably launch attacks on small and medium sized businesses in the near future using the same techniques employed by hackers...

Microsoft MMC How To: Hardening Desktops for Improved Security

In many-layered defense approaches, you will find a hardened desktop somewhere in...

Latest articles