YouTube Comments Loaded With Malware Links
The Panda Labs blog details how malware is spreading on YouTube comments through the use of “Malspam,” that leads users to malware sites where users are duped into paying for bogus software. The trap...
View ArticleTwitter Users Victims of Two-Phase Attack: Screencast
It looks like Twitter users were hit by a two-phase attack over the past week, fueling expert claims that Twitter is in criminals sights as a ripe place to execute “for-profit,” attacks. Phase 1:...
View ArticleThe Top 10 Malware Sites As Indexed By Google
Google has found more than 4,000 malware sites with more than 1,700 originating from China. Of those, Google created a top 10 list that counts the number of compromised web sites that reference it....
View ArticlePatch Tuesday: Five Critical Severity Ratings
Microsoft has released five new security bulletins in the September version of Patch Tuesday. All bulletins are rated with a Critical severity rating. This month, Windows 7 is not an affected product...
View ArticleOn 9/11 Cyber Attacks Have Become Almost Mundane
The news, search, social networks — on 9/11 where can you go online that is not under attack? Here’s a recap of just a few of the latest exploits. And this is just smidgen of what is happening....
View ArticleTek-Tips of the Week
Top Stories Battle for Open Source’s future got a well deserved nod from our industry’s leader in software integrity, Coverity: "Open source developers are actively improving software. In 2009, the...
View ArticleComparing Email Management Systems that Protect Against Spam, Viruses,...
Email is absolutely critical to the health and efficiency of business-critical applications. Proper management and protection from the growing array of threats that impact it is an increasingly vital...
View ArticleSMCI Widget and growsmartbusiness.com by Network Solutions Still Serving...
by Wayne Huang, Fyodor Yarochkin, NightCola Lin, Chris Hsiao of Armorize. Screenshot 1 The beginning of this year saw mass Web hosting compromises across numerous hosting providers; thousands of...
View ArticleGoogle… paranoid, or proactive?
From alerts about malware to blocked websites in China, Google sometimes comes off as a bit paranoid. Today Google reinforced this image, with security warnings about state-sponsored attacks. Google...
View ArticleTrapping Malware With Honeypots
Hackers systematically scan the Internet for vulnerable systems with the help of self-spreading malware. On average, accessible systems are the target of an attack every three minutes whereby security...
View ArticleBusiness Phones Security
Threats to VoIP and What to Do about Them In the Internet age, businesses have learned about the importance of digital security. Sometimes, we forget that our phone systems are now internet-based and...
View ArticleSecurity and Data Centers
Twenty years ago, I ran a small group in a large corporation’s subsidiary, which developed firewall and virtual networking gear. In those days, most people were beginning to discover what the Internet...
View Article
More Pages to Explore .....