HomeCybersecurity

Cybersecurity

Gaps Remain in Disaster Recovery Plans

Youd think the 9/11 terrorist attacks would have taught IT executives everything they needed to learn about making thorough business continuity and disaster recovery...

Spyware Wins a Round

On June 28 Merijn Bellekom, the prolific programmer and spyware crusader, announced the final update of CWShredder, the standard for removing the infamous CoolWebSearch...

Windows Update

Operating systems just aint what they used to be. For a while, Microsoft Corp. released a new version of Windows every two or three...

Yahoo Plugs PNG Security Hole

Yahoo Inc. has issued a security update to its popular instant messaging service to fix broader vulnerabilities in an advanced graphics format.Late on Tuesday,...

Antepo, Spyrus Pair on Secure Instant Messaging

Spyrus Inc. will use secure IM technology from Antepo Inc. in its own cryptographic systems. "We provide granular authentication to let instant messaging work...

Widcomm Bluetooth a Virus Risk

Widcomm Bluetooth Connectivity Software contains a serious vulnerability that could lead to wireless delivery of malicious worms and viruses, according to an advisory from...

Survey: Most Spam Comes From U.S. Spammers

Just under 86 percent of spam sent to enterprises between May and July came from U.S. spammers, according to a survey by CipherTrust Inc....

Mosquito Trojan Set to Infect Mobiles

A new pirated game that describes itself as Mosquito v2.0 contains a Trojan that sends out premium-rate SMS messages without the users consent. The...

Should You Put Windows XP SP2 Deployment on Autopilot?

Ive seen reports of people who are shocked! Shocked to hear that there are applications and network configurations that fail to function under Windows...

An Open Letter to Virus Authors

Its bad enough that the humans—if you can call them that—who create viruses and malware are trying to turn our desktops into instruments of...