Submit Your News
News by Zone
News by Date
News by Category
Register for our Free Newsletters
Deutsche Zone (German Zone)
Education, Training and Professional Services
Guarding, Equipment and Enforcement
Industrial Computing Security
Other Carouselweb publications
A botnet is a collection of computers which have been taken control of and which are used in combination to send out spam and other malicious software
Aladdin discovers widespread phishing attacks aimed at eBay customers
eBay users targetted in phishing scam aimed at extracting personal details and information about eBay purchases
McAfee advice in wake of fraud on the Next directory
No room for complacency as large scale fraud and powerful botnets continue to hit businesses
Obfuscation malware overtakes Trojans as number one IT threat
August malware threat report reveals that newer, stealthier variants outnumber Trojans as the biggest threat.
WatchGuard report identifies rise in Web 2.0 risk levels
Social networking and instant messaging provide perfect vehicles for malware as IT security risks continue to develop and adapt.
Facetime forecasts increase in IM threats
Facetime issues report on 3rd quarter findings of P2P and IM threats along with gloomy forecast for 4th quarter
Wave of extra spam forecast by SoftScan
SoftScan warns of additional spam at the start of the new academic year as students return to their studies.
Symantec comments on Lords report.
Symantec raises concerns regarding proposed changes to the liability of IT providers in latest House of Lords report on personal internet security.
ESET reports on top threats for July
Ani.Gen Trojan remains at number one in the table of most prolific threats for July.
Rented botnets defy detection.
Finjan reports on a new trend towards smaller and more agile botnets, rented out by the hour to avoid being detected and stopped.
Spammers target anti-money laundering website.
Recent spam campaign seeks to damage the reputation of the Bobbear anti money laundering web site by asking for donations.
Fighting Botnet threats with Prodigy
Global Security One explains denial of service attacks and how to prevent them with the company's Prodigy and Xgate products.
Microworld technologies warns of the latest MP3 spam blocking inboxes.
Adaptive spam filters block out the new wave of MP3 pump and dump spam which contains low quality voice recordings.
Fortinet reports improved malware blocking for July.
Despite overall improvements in malware blocking, some viruses and Trojans retain persistent levels of effectiveness indicating need for improved web site clean-up activities.
Reputation based web filtering from IronPort Systems.
IronPort Systems offers a new wave of enhancements to its internet security product for content and URL filtering and site certification.
Endpoint appliance resists threats by botnets.
Promisec enpoint technology recognises botnet activities and helps prevent denial of service attacks breaking through to servers.
McAfee forecasts malware trends for 2008
Instant messaging, web 2.0 and MS Vista seen as the predominant areas of increasing concerning for malware in 2008 according to McAfee combined with a welcome reduction in adware.
FBI crackdown on botnets welcomed by Finjan.
Finjan announces its support for Operation Bot Roast, an FBI initiative to take legal action against bot initiators who are involved in computer fraud.
Trojan gains proxy internet access through victim computer.
MicroWorld Technologies identifies malware that enables remote users to connect to the internet through the victim's computer.
Survey reveals extent of temporary employee risk.
Research results suggest UK employers are far too trusting of temporary staff and allow them access to far more confidential data than they need to know thus exposing organisations to unnecessary levels of risk.
McAfee cyber crime study reveals increasing threat sophistication
McAfee predict increased incidences of fraudulent internet based activity during 2008 along with widespread use of cyber espionage by governments which may threaten national security.
Advice for forum participants from FaceTime Security.
After discovering trade auctions for stolen credit card information on public forum, FaceTime Security issues advice to users who exchange innocent information on such web sites.
Alliance to deliver large network protection against web threats.
Crossbeam Systems and Trend Micro collaborate to produce web filtering and malware protection for large networks.
Latest exploits make use of web 2.0 for malware delivery.
Finjan discovers new style of crimeware which makes use of web 2.0 technology as a mechanism for delivering malicious software.
September malware report shows significant increase in activity.
Viruses and phishing attacks increased significantly during September along with new wave of highly targeted and sophisticated attacks signalling need for increased vigilance and security.
Storm worm identified as most prevalent in 2007
BitDefender confirms botnets as the largest distributor of IT security threats of 2007 with the Storm Worm malware outnumbering other by approximately 10%.
Five steps to the protection of critical data systems.
Third Brigade CTO provides some insight into the protection of critical systems through the development of his five step approach.
BotNets top the chart as the yearÃƒÂ¢Ã¢â€šÂ¬Ã¢â€žÂ¢s most significant threats.
BitDefender's round up of 2007 sees BotNets and Trojan downloaders as the most prevalent threats of the year and predict an increase in political spam during 2008.
BitDefender predicts an increase in mobile targets for cyber-criminals.
2008 will be a year in which mobile devices are targeted according to BitDefender with WAP pushing and SMS spam on the increase.
Storm worm used for large scale bank phishing.
Phishers have kicked off 2008 with a sophisticated phishing scam using the Storm Worm botnet aimed at Barclays customers.
ValentineÃƒÂ¢Ã¢â€šÂ¬Ã¢â€žÂ¢s day comes early for spammers.
Sophos warns of e-mail love letters with links to web page containing a big red heart and the Storm Trojan.
Softscan urges modification of on-line lifestyle.
Softscan predicts an increase in IT threats based on social engineering in 2008 and urges users to respond appropriately.
Storm tracker keeps watch on worm progress.
Detailed information kept up to date by Secure Computing regarding the distribution and spread of the Storm worm.
Top in tests recognition for Norman products.
IT journal tests put Norman Security Suite in first place for IM protection and resilience against viruses and phishing.
Compromised website quantity overtakes purpose built hack sites.
Legitimate web sites are increasingly being compromised to host malicious software to the extent that they now outnumber purpose built malicious sites.
ESET reviews malware landscape of 2007
Global threat report reviews 2007 and examines malware trends throughout the year.
Unsuspecting bots distribute Storm Trojan on start-up.
Sophos detects trend of Trojan distribution peaking as unsuspecting distribution computers are booted in Beijing, New York and London.
Pay per click fraud rises in 2007
Click Forensics releases latest fraud figures for pay per click web services in the fraud report on the click fraud network.
MarkMonitor warns of holiday season brand abuse.
Brandjacking Index report available from MarkMonitor detailing the risks associated with on-line shopping in the holiday season.
Growth of botnets put IT resources at risk.
Brookcourt Solutions warns companies of the risk of their networks being taken over in the meteoric rise of botnets.
Spam firewall specifically for smaller businesses.
License free firewall available from Barracuda Networks for up to 50 users.
April swamped with new IT security threats
ESET research shows increase in new malicious software during April after a stable period.
USA and Russia account for nearly a third of all relayed spam.
Final quarter report from Sophos on spam distribution sees increase in volumes of spam from Russia and Asia as the continent exploits the criminal income potential of unwanted e-mail.
Apathetic internet users make on-line criminalsÃƒÂ¢Ã¢â€šÂ¬Ã¢â€žÂ¢ lives easier.
PC Tools warns of difficulty in improving internet safety standards due to user apathy particularly in the teenage community.
Linux virus detection utility available from Sophos.
Six years on from the first Linux virus, Sophos reminds users of the operating system to be aware of the risk of malicious software and makes detection software available.
MS patches block potential intrusion to heart of operating system.
The latest release of patches from Microsoft are critical in preventing a host of potential malicious software from gaining control of victim computers according to Lumension.
Prediction of increase in malicious attacks over mobile networks for 2008.
Worldwide increases in levels of spam and phishing attacks over mobile networks are predicted by Cloudmark for 2008.
Trend Micro 2008 forecast for cybercrime.
Increasing trend in underlying criminality for financial gain in the area of cybercrime set to continue throughout 2008.
Hacking network brought down by Canadian police.
Canada puts an end to network of 17 hackers responsible for setting up sophisticated botnets.
Out of office feature exploited by spammers.
Using the web based out of office messages, spam generators have found a way to get around spam filters.
Teenage computer criminal arrested in New Zealand.
Arrested teenager could face long term of custody if found guilty of leading international cyber-criminal ring responsible for infecting millions of computers.
News by Zone
News by Date
News by Category
Submit Your News