Internet security firm, Lumension, is warning IT departments to prepare for Microsoft’s heavy patching activity this month.
Carbon credits phishing scam revealed
Reports are coming in that a phishing scam centering on the international carbon credits scheme is causing havoc on international emissions trading exchanges.
Intel unveils latest high-security vPro processor platform
Intel has finally unveiled its long-awaited update to the vPro processor platform, adding a variety of security and advanced management services for company PC users.
Gordon Brown spam email is a hoax
IT security and data protection firm, Sophos, have released a warning to web users that an email claiming that an image of Gordon Brown’s smile will infect your PC is a hoax
US ill-equipped to cope with mounting cyberattack threat
The US is at risk of a crippling cyberattack and is currently unable to defend itself adequately, according to testimony given before Congress yesterday.
Sunbelt malware list displays Trojan threat
Security software provider, Sunbelt Software, has reported a top 10 list of last month’s most frequent malware threats. Trojan horse files are considered to be the most dangerous. The top entry on the list; Trojan.Win32.Generic!BT made up almost a qua…
Researchers develop way to catch online gaming cheats
Researchers have formulated a way to identify cheating in online games in a discovery that could revolutionize the growing market for virtual gaming assets.
McAfee targets small to medium-sized businesses with QuickStart service
McAfee has announced a service to help get SMBs up to speed with their security needs. Security Quickstart Services specifically targets small to medium-sized businesses, providing help with implementing, maintaining and optimizing security best practi…
Internet Explorer 8 reaches top browser spot
Internet Explorer 8 is now the world’s most-used browser, according to the latest figures from Network Applications.
Attack fools iPhone into trusting fake certificates
An anonymous researcher has posted a proof-of-concept attack that fakes a trusted root certificate on the iPhone. Researchers have confirmed that the attack works, making it possible for anyone to create a web page that is deemed to be trusted by Apple.