Ouch! – Why SQL injections really sting and how to protect yourself

"SQL injection" – the phrase seems forbidding, and the reality it signifies is quite sinister.In fact this concept was mostly unknown just a few months ago, but now Web site developers around the

Published on: October 24th, 2008 Brian Jackson

E-ticket scam crash lands victims into a load of malware

In a reprise of a summer tactic, hackers are trying to trick people into infecting their PCs with malware by e-mailing them spurious airline-ticket invoices and boarding passes, a security company said today.The

Published on: October 22nd, 2008 Gregg Keizer

Bots could imperil your iPhone and blight your Blackberry

The ability of malware writers to consistently stay ahead of those seeking to stop them has been a constant factor in the security industry over the past several years.Looking to 2009, don't expect

Published on: October 21st, 2008 Jaikumar Vijayan

Hackers compromise thousands of Web sites

Several criminal gangs have acquired administrative log-in credentials for more than 200,000 Web sites -- including the one used by the U.S. Postal Service -- and have used the compromised domains to attack

Published on: October 6th, 2008 Gregg Keizer

Cybercrooks cast Brad Pitt, Beyonce and Justin T. in latest malware attacks

Googling celebrities on your workstation at the height of the recently concluded Toronto Film Festival could have been one of the most risky cyber-activity this month.Reverting to a tried and true tactic, spammers

Published on: September 22nd, 2008 Nestor Arellano

US gov’t focuses on cybersecurity backdoor defences

As part of a comprehensive cybersecurity push, the U.S. government will focus on improving its network defense capabilities and on revamping acquisition rules to protect against malicious code installed during the manufacturing process

Published on: September 16th, 2008 Grant Gross

Stretching security – the mobile device challenge faced by the enterprise

Trying to secure laptops, cell phones, PDAs, and other mobile devices today is "terrifying," says Christopher Paidhrin, IT security and HIPAA compliance officer at Southwest Washington Medical Center. "End-point security is scarily immature."

Published on: September 11th, 2008 Tom Kaneshige

Paris Hilton is McCain’s running mate

As if John McCain's selection of neophyte Alaskan Governor Sarah Palin to fill the second half of the Republican Party's presidential bill wasn't sensational enough, spammers proclaimed Paris Hilton as the unlikely running

Published on: September 8th, 2008 Brian Jackson

Eight e-mail scams that have suckered millions

Congratulations, you won the lottery in a country whose name you can't even pronounce! A wealthy oil executive in a far-off land wants to give you millions of dollars, right now! Sexy girls

Published on: August 25th, 2008 Nick Mediati and Anne B. McDonald

Hackers exploit Olympic fever to infiltrate PCs of unsuspecting fans

Cyber-criminals are using the Olympics to put malware on the podium, hijacking legitimate Olympic coverage and content so as to infect those involved with the Beijing Games and its fans, according to security

Published on: August 19th, 2008 Brian Jackson

CloudAV could “supercharge” anti-virus security

Combining multiple vendor offerings in a virus-scan service delivered via cloud computing technology could be very effective in detecting malware, according to research from the University of Michigan.The new approach – dubbed CloudAV

Published on: August 11th, 2008 Brian Jackson

Fabulous and free – 15 downloads to protect your privacy

One of the worst privacy invaders the world has ever seen is the Internet. When you surf, Web sites can find out where you've been and can gather other information about you. Trojan

Published on: August 7th, 2008 Preston Gralla

Three new browsers that say ‘no’ to malware

The latest browsers are fighting back against the never-ending assault from online crooks who want to sneak malware infections through your browser and onto your PC. Firefox 3, Opera 9.5, and, soon, Internet

Published on: August 6th, 2008 Erik Larkin

Malware miasma

Malware threats on the Web grew at an exponential rate over the first half of 2008, security experts say.During this period, there was a new Web page infected with malicious content every five

Published on: August 5th, 2008 Brian Jackson