[caption id="" align="alignleft" width="260" caption="Vaccine"][/caption] Simon Edwards created a great blog post about this April 12, 2012. He started out with: " Once upon a time, ...
[caption id="" align="alignleft" width="250" caption="MS DOS 6.0"][/caption] Remember MS-DOS Version 6? It was released March 1993. The new 6.0 had a lot of new stuff including a basic ...
Cybercriminals are as organized and industrious as any legitimate business. Case in point: exploit kits, also known as crimepacks, which bad guys can purchase and which make infecting ...
Researchers at NQ Mobile, working alongside researchers at North Carolina State University, have discovered new Android malware that is controlled via SMS that can do a number of things ...
Roger Grimes made this remark on InfoWorld when he commented on the 2012 Verizon Data Breach Investigations Report that was released last week. What he said was: "You should enable event ...
The CSO website reported: "A Mac trojan horse spotted by security analysts since last year has infected more than 600,000 Apple computers, says Dr. Web, a Russian antivirus vendor. Apple ...
This is a good hint for your users from the Microsoft website: "If you plan to share an electronic copy of a Microsoft Word document with clients or colleagues, it is a good idea to ...
Roger Grimes at InfoWorld observes something encouraging..."Every public speaker and writer likes a good catchphrase or refrain that will grab the audience's attention. One of mine: ...
[caption id="" align="alignleft" width="290" caption="Global Payment Hacked"][/caption] This is what they said in their press release: Global Payments Inc. (NYSE: GPN), a leader in ...
[caption id="" align="alignleft" width="175" caption="Fighting Phishing"][/caption] BankInfo Security summarized the phishing problem for the Financial Industry, and quotes the security ...
Some excellent work by our colleagues at Trend Micro. They see that users are the weakest link in IT! [caption id="" align="alignleft" width="550" caption="Weakest Link in IT"][/caption]
Trendmicro reported: "We have recently analyzed a series of emails sent to specific users that leverage a certain prominent socio-political issue. One of these messages is about the ...
[caption id="" align="alignleft" width="361" caption="Malware Unique Samples"][/caption] Malware is still exploding. Check out this graph. During the last few years, the security industry ...
You have probably heard about how Microsoft, the US Marshals together with some other organizations killed some some Zeus botnets. Microsoft's PR crew released a video about the operation ...
Holland's capital The Hague will get a new international showpiece. The new European Centre for Cybercrime will start there early 2013. European Commissioner for Home Affairs Cecilia ...
I wrote a new article that is also available in the resources section on our website: More and more, the bad guys are bypassing your firewall, endpoint protection and other ...