Google adds phishing URL alerts into network tool
Google has added notification for phishing URLs to its service that lets administrators know if their networks have been compromised.
Jeremy Kirk | 15 Oct | Read more
Google has added notification for phishing URLs to its service that lets administrators know if their networks have been compromised.
Jeremy Kirk | 15 Oct | Read more
Smartphone exploits are coming, as cybercriminals start to figure out how to make money by hacking mobile devices, two mobile security experts said Tuesday.
Grant Gross | 06 Oct | Read more
The Zeus botnet remains a robust network that is difficult to destroy despite an international sting operation that saw dozens arrested this week for allegedly stealing money from online bank accounts.
Jeremy Kirk | 02 Oct | Read more
U.S. authorities dealt a significant blow to the most successful computer crime organization this week, but it's unclear whether the masterminds behind the Zeus malware will ever be brought to justice.
Robert McMillan | 01 Oct | Read more
A U.K. company is seeking to displace penetration testing companies with an appliance and software that can frequently test whether security devices are catching bad network traffic and exploits.
Jeremy Kirk | 28 Sep | Read more
A security researcher today revealed yet another way that the Stuxnet worm spreads, a tactic that can re-infect machines that have already been scrubbed of the malware.
Gregg Keizer | 28 Sep | Read more
The FBI has launched an investigation into the "Here you have" worm, which disrupted corporate e-mail systems in the U.S. two weeks ago.
Robert McMillan | 24 Sep | Read more
Researchers are seeing an uptick in the number of spam-related domains from Russian registrars, a sign that cybercriminals are choosing those providers due to lax enforcement.
Jeremy Kirk | 24 Sep | Read more
A serious security flaw was apparently found on Twitter on Tuesday but was quickly fixed.
Jeremy Kirk | 22 Sep | Read more
The Stuxnet worm is a "groundbreaking" piece of malware so devious in its use of unpatched vulnerabilities, so sophisticated in its multi-pronged approach, that the security researchers who tore it apart believe it may be the work of state-backed professionals.
Gregg Keizer | 17 Sep | Read more
A sophisticated worm designed to steal industrial secrets and disrupt operations has infected at least 14 plants, according to Siemens.
Robert McMillan | 15 Sep | Read more
The "Here you have" worm that clogged e-mail systems on Thursday briefly caused one of the worst spam outbreaks of 2010, according to Cisco Systems.
Robert McMillan | 11 Sep | Read more
The developers of the uTorrent file-sharing application have released an updated version that fixes a problem that could allow an attacker to load malicious code onto a user's computer.
Jeremy Kirk | 30 Aug | Read more
The non-profit, Chicago-based internet security research firm Team Cymru (pronounced 'kum-ree') will release a new tool next month that it hopes will be a game changer in the fight against world-wide cyber crime.
Joan Goodchild | 26 Aug | Read more
The software security market is preparing for a boom as demand for Malware protection increases.
Lisa Banks | 18 Aug | Read more