Rent-a-botnet service makes launching attacks easier

Online fraudsters that aren't highly skilled in the arts of cyber crime can now rent a service that offers an all-in-one hosting server with a built-in Zeus trojan administration panel and infecting tools,

Published on: May 16th, 2008 Andrew Hendrey

Spam totally out of control, experts say

Although the motivation may be the same there's now very little to relate today's spammers to the original daddy of unsolicited e-mail, according to technology security experts.Some 30 years ago, Gary Thuerk, sent

Published on: May 9th, 2008 Nestor Arellano

Notorious Rock Phish gang pummels PC users with new attack strategy

A notorious online gang known for its prolific phishing operations has expanded its means of attack, potentially putting more PC users at risk of losing personal data.The Rock Phish gang surfaced around 2004,

Published on: April 22nd, 2008 Jeremy Kirk and Robert MacMillan

Sweet-toothed employees willing to exchange passwords for candy

Is your network secure enough to fight off chocolate?The short answer: probably not. Even with all of the security-related news in recent years, Infosecurity Europe's now famous experiment (it just completed the sixth

Published on: April 21st, 2008 Mark Gibbs

CEOs, senior mangers’ computers hacked in fake subpoenas scam

Panos Anastassiadis didn't click on the fake subpoena that popped into his Inbox on Monday morning, but he runs a computer security company. Others were not so lucky. In fact, security researchers say

Published on: April 18th, 2008 Robert MacMillan

How to nab the enemy within

Corporations are woefully unprepared to counter attempts at corporate espionage, say experts who perform vulnerability assessments designed to uncover security weaknesses. North American corporations lose as much as $300 billion a year to

Published on: April 18th, 2008 Mary Brandel

Expert tips on saving your brand from being cyber-jacked

Authentication technologies are a great way for businesses to protect their corporate domains against use in phishing and spoofing attacks, experts say.Internet Service Providers (ISPs) and many businesses are ramping up use of

Published on: April 7th, 2008 Brian Jackson

New reputation tools foil treacherous Web 2.0 hack attacks

Reputation-measurement is one of the newer ways of blocking malware in a world where threats have grown more elaborate and cunning, and Web 2.0 has grown the audience for rich media.While the continuing

Published on: April 4th, 2008 Stephen Bell

Ten reasons you should be paranoid each time you power up your PC

The truth is out there ... and so is your data. And just because there are no virtual black helicopters following you doesn't mean somebody somewhere doesn't have a bead on who you

Published on: April 2nd, 2008 Dan Tynan

New online tax scams and how to avoid getting ripped off

Scam artists exploiting tax season have devised a range of new online cons: fake tax documents that contain malicious surprises; mass distribution of keyloggers aimed at snatching the identity of PC-based tax filers;

Published on: April 1st, 2008 Tom Spring

Online crooks target government Web sites for phishy tax refunds

Stealing money through fraudulent tax refunds was the main purpose of phishing activity targeting government Web sites during the month of February. This was a finding of "The State of Phishing" monthly report

Published on: March 28th, 2008 Joaquim P. Menezes

New security threats baffle IT professionals

As enterprises seek out ways to reduce IT costs, optimize resources and improve operational efficiencies, three technology trends have started to dominate: virtualization, service-oriented architecture and mobility. More promising yet is the intertwining

Published on: March 25th, 2008 Deb Radcliff

Apple updates Safari and OS X in double whammy update

Apple Tuesday issued a record-breaking security update that patched nearly 90 vulnerabilities in both its own code and the third-party applications it bundles with its Tiger and Leopard operating systems. Security Update 2008-002

Published on: March 20th, 2008 Gregg Keizer

Security vendor Trend Micro victim of massive Web attack

Security vendor Trend Micro has fallen victim to a widespread Web attack that splashed malicious software onto hundreds of legitimate Web sites in recent days.A Trend Micro spokesman confirmed that the company's site

Published on: March 17th, 2008 Robert McMillan