Analyst firm A-V Comparative has released its November 2013 list of the antimalware programmes that do the best job of removing malware from an already infected system. What does this mean? As A-V Comparative notes, most PC users ...
To help enterprises safeguard business data and set security policies for end-users at an affordable price, Kingston has announced the release of the DataTraveler Vault Privacy 3.0 (DTVP) secure USB Flash drive as well as the DataTraveler ...
Kaspersky Internet Security 2013 has been named the industry’s best home security solution by Dennis Technology Labs. Kaspersky Lab’s solution took the top spot in Dennis’ home test for anti-virus protection from April ...
Tags: Kaspersky, Anti-Virus Test
IDG News Service - A simple piece of malicious software is circulating that steals Litecoins, a virtual currency based on the Bitcoin system. Security vendor ESET wrote the malware infects Windows computers. The program tries to steal ...
Tags: Computer Products, software, network
Android smartphones and tablets are under attack, and the most popular tools developed to protect them are easily circumvented, according to new research from Northwestern University and the University of North Carolina. The researchers ...
Tags: Computer Products
A Gartner report about the security software market out today shows that number-two-ranked McAfee enjoyed the most overall growth last year, Trend Micro slipped but stayed number three, and Symantec held onto its top spot with 19.6 percent ...
Tags: Gartner, McAfee, Trend Micro
Security researchers from antivirus vendor ESET discovered a piece of cyberespionage malware targeting Tibetan activists that uses unusual techniques to evade detection and achieve persistency on infected systems. The malware, which was ...
Tags: Computer Products, software
A recent intrusion on the computer network of Norwegian telecommunications company Telenor was the result of a large cyberespionage operation of Indian origin that for the past few years has targeted business, government and political ...
Tags: Computer Products, software
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why. Last week, security companies Eset and Sucuri found Apache servers infected with Linux/Cdorked. If that ...
Tags: Web software, software, Computer Products
Security researchers have uncovered yet another ongoing cyberespionage operation targeting political and human rights activists, government agencies, research organizations and industrial manufacturers primarily from Eastern European ...
Tags: Cyberespionage Operation, CrySyS Lab, Computer Products
A report released National Audit Office revealed that the UK IT skills shortage means that Britain could have trouble defending itself from cyber attacks over the next 20 years. The UK was hit by over 40 million cyber attacks in 2011 ...
Tags: National Audit Office, UK, IT industry
A group of hackers on Thursday published a list of over 453,000 log-in credentials on the Internet that were allegedly stolen from a database associated with an unnamed Yahoo service. The group of hackers calls itself "the D33Ds Company" ...
Tags: hackers, Yahoo, database, leaked information, MySQL
A new variant of a Trojan program called Reveton that prevents victims from using their computers and displays rogue messages from law enforcement agencies is using localized voice messages to trick victims into paying made-up fines, ...
Tags: Reveton, victims, computers, displays, antivirus vendor, Trend Micro
Approximately 3.6 million Social Security numbers and 387,000 credit and debit card numbers belonging to South Carolina taxpayers were exposed after a server at the state’s Department of Revenue was breached by an international ...
Tags: credit cards, Data leak, protection, security breach, Social securtiy
Cloud-based security services provider Zscaler has released an implementation for Internet Explorer of the HTTPS Everywhere browser security extension. HTTPS Everywhere forces the browser to always connect over HTTPS(HTTP Secure)to ...
Tags: cloud-based security services, Zscaler, HTTPS Everywhere