Phishing attack cons Twitter users into divulging confidential details

Twitter users have been tricked into divulging their login and password details to a Web site that then spammed their contacts. Earlier this month hundreds duped by another series of Twitter phishing attacks.

Published on: May 29th, 2009 Jeremy Kirk

Conficker menace continues – Worm infecting 50,000 PCs a day

The Conficker worm is still infecting systems at a brisk rate and continues to snag computers in Fortune 1000 companies, according to security researchers.The worm is infecting about 50,000 new PCs each day,

Published on: May 22nd, 2009 Robert McMillan and Steven J. Vaughan-Nichols

Malware found on brand new Windows netbook

After discovering attack code on a brand new Windows XP netbook, antivirus vendor Kaspersky Labs warned users yesterday that they should scan virgin systems for malware before connecting them to the Internet.When Kaspersky

Published on: May 20th, 2009 Gregg Keizer

No major Conficker incident but the threat still lurks

An expected activation of the Conficker.c worm at midnight today passed without incident, despite sensationalized fears that the Internet itself might be affected, but security researchers said users aren't out of the woods

Published on: April 2nd, 2009 Summer Lemon

Online job seekers pounded with spam, malware

As unemployment levels soar in Canada and overseas, spammers are having a field day bushwhacking hapless job seekers with career-related spam and malware.Recently laid-off professionals were targets of a significant portion of spam

Published on: March 26th, 2009 Michelle MacLeod

One man’s 12-year battle against malware

I first started fighting computer malware back in 1987. Back then, it was a lot easier. We didn't have the Internet (in widespread use). Viruses and Trojans were limited to an even dozen

Published on: January 26th, 2009 Roger A. Grimes

How to protect your PC from the biggest worm attack in years

Security experts say it's the biggest worm attack in years, call it "amazing" and report that it infected nearly nine million PCs in just two weeks.Downadup is downright nasty. And that's even before

Published on: January 22nd, 2009 Gregg Keizer

Bots could imperil your iPhone and blight your Blackberry

The ability of malware writers to consistently stay ahead of those seeking to stop them has been a constant factor in the security industry over the past several years.Looking to 2009, don't expect

Published on: October 21st, 2008 Jaikumar Vijayan

Cybercrooks cast Brad Pitt, Beyonce and Justin T. in latest malware attacks

Googling celebrities on your workstation at the height of the recently concluded Toronto Film Festival could have been one of the most risky cyber-activity this month.Reverting to a tried and true tactic, spammers

Published on: September 22nd, 2008 Nestor Arellano

Stretching security – the mobile device challenge faced by the enterprise

Trying to secure laptops, cell phones, PDAs, and other mobile devices today is "terrifying," says Christopher Paidhrin, IT security and HIPAA compliance officer at Southwest Washington Medical Center. "End-point security is scarily immature."

Published on: September 11th, 2008 Tom Kaneshige

Paris Hilton is McCain’s running mate

As if John McCain's selection of neophyte Alaskan Governor Sarah Palin to fill the second half of the Republican Party's presidential bill wasn't sensational enough, spammers proclaimed Paris Hilton as the unlikely running

Published on: September 8th, 2008 Brian Jackson

Symantec offers small businesses “hassle free” security apps

Small business operators often carp about resource-guzzling security products that eat up precious computer memory, slow down their processes, and require extra time to maintain.But Symantec Corp. says it has the antidote –

Published on: July 16th, 2008 Nestor Arellano

Microsoft fix pulverizes password theft software on 2 million PCs

Microsoft's June security updates were bad news for online criminals who make their living stealing password information from online gamers.The company's Malicious Software Removal Tool (MSRT) – a program that detects and removes

Published on: June 24th, 2008 Robert McMillan

There’s a cyber war looming and we’re doing little about it

"Rogue" states and criminal organizations have stepped up their capabilities to launch crippling online attacks, says technology strategist who has briefed U.S. members of Congress on threats of a "cyber war".That's the bad

Published on: June 18th, 2008 Nestor Arellano