HomeBlogsSecurity Watch

Security Watch

No Stopping Storm Variants

After the emergence of the Trojan.JS.Encrypted.A attack last week -- yet another in a long line of variants built off of the long-running Storm...

Say Hello to Hydraflux

A malware researcher with the SANS Internet Storm Center has uncovered a new twist on the fast-flux botnet infrastructure model that could make networks...

BlackBerry Flaw Highlights Mobile Data Risks

Mobile malware hasn't materialized to the extent that some experts were predicting it would several years ago, but that doesn't mean that threats won't...

First Half of 2008’s Most Bizarre Malware

Anti-virus specialist Panda Security has issued a listing of the most unique and unusual malware specimens that its researchers uncovered during the first six...

Huge Volumes, Big-Time Sites Hacked via Asprox Attacks

According to a new report published by experts at security filtering specialist Finjan, the company observed more than 1,000 unique Web site domains serving...

UPS-Themed E-mails Deliver… Malware

Malware distributors have moved to a new vehicle (think big brown vans) for delivering their wares, tapping into the popularity of overnight giant UPS'...

Tips on Keeping SCADA Safe

Following on some interesting vulnerability research in the area by vendors who shall go unnamed for the purpose of avoiding conflicts of interest (ahem...)...

A Sad Day for the Security Industry

Shocking news arrived over the last day from Hawaii, where the body of Webroot founder Steven Thomas was discovered post mortem.Thomas, 36, had apparently...

IT Leaders Still Sweating Data Loss

DLP vendors (and really any other security and encryption technology providers), take heart: Most IT executives are still uneasy about their ability to keep...

New Multimedia Trojan on the Loose

Researchers at gateway security specialist Secure Computing have identified a new Trojan virus being distributed in the wild via infected multimedia files.First detailed in...