- Welcome Guest
- Sign In
Pimply faced pranksters and lone profiteers who poison computer systems have been replaced by organized criminals of a different breed. "These guys are professional organizations. They are fully funded and they're writing specifically for profit," David Frazer, director of technology services at F-S...
Virtualization rootkits, Web application security and Voice over IP attack vectors topped Gerhard Eschelbeck's list of the top three biggest issues at this month's Black Hat USA conference, held Aug. 1 and 2 in Las Vegas. Eschelbeck is chief technology officer and senior vice president of security v...
A group of hackers infiltrated the United Nations' Web site over the weekend, defacing the page of Secretary-General Ban Ki-Moon with antiwar political graffiti. Hackers reportedly replaced portions of recent speeches made by Ban with accusations that the United States and Israel are killing childre...
Internet security research firm Sophos has warned of a massive spam campaign it has detected within the past 24 hours. The spamming operation, known as a "pump and dump," was designed to boost the share price of company that sells wireless products to young people, according to Sophos. "On Tuesday, ...
Five million is a lot of anything. That's why the folks at Boston-based software maker IObit caught my eye recently when they announced they had just cracked the cinco millones mark in downloads for their free Windows maintenance program Advanced WindowsCare Personal. The application, its most recen...
Other than perhaps the medical and legal industries, no field relies on jargon more than computer technology. Take, for instance, the use of words borrowed from other lexicons -- terms such as "virus, "Trojan," "intrusion prevention system," "spyware," and "attack vector." You might well hear these...
Security firm Trend Micro has released TrendProtect, a free browser plug-in that alerts computer users to unsafe Web sites that contain unwanted content and hidden threats. The free download is designed to help consumers and business Web surfers avoid an alarming number of Web sites infected with ma...
A sophisticated group of spammers has been targeting since late May high-salaried workers at selective corporations in a spam attack using e-mail disguised as messages from the Better Business Bureau, the Internal Revenue Service and the Federal Trade Commission. A fourth variation of the spam attac...
Following the massive cyberattacks against the Baltic country of Estonia in April, NATO on Thursday asserted that cyberdefense must now be a priority among member nations. Several defense ministers, including Estonia's, raised the issue during a meeting at NATO headquarters in Brussels, Belgium, and...
The FBI is launching a new initiative in the cyber crime wars, taking on the criminal organizations -- the so-called "bot herders" -- that have gathered under their control compromised or zombie PCs. The bot herders' purpose is to send out malware or spam and phishing campaigns over the Internet tha...
A former substitute teacher for a Connecticut middle school has been granted a retrial following a conviction that launched a wave of sympathy and outrage. Julie Amero could have been sentenced to 40 years in prison after being found guilty of exposing her students to Internet pornography. However, ...
Antispyware legislation awaiting Senate action offers little promise of meaningful prosecution against violators, said Ron O'Brien, a senior security analyst with antispyware firm Sophos. The U.S. House of Representatives has passed an antispyware bill that would impose specific penalties for scamme...
The Chinese People's Liberation Army has set up "information warfare" units to create viruses for use in attacking enemy computer systems and networks, according to a Department of Defense report released Friday. "The People's Liberation Army is pursuing comprehensive transformation from a mass army...
The U.S. House of Representatives has passed an antispyware bill that would impose specific penalties for scammers accessing computers without authorization while attempting to commit other federal crimes. The bill, sponsored by both Democrats and Republicans, would make the fraudulent use of spywar...
After three weeks of coordinated cyberattacks on Estonian Web sites, NATO has reportedly sent an official to the country to help investigate. About 1 million computers worldwide were reportedly used to conduct the denial-of-service attacks on Estonian government and corporate Web sites, swamping the...