Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Companies around the world are increasingly using social media for business marketing, support, and collaboration but also exposing themselves to risks such as non-compliance, data loss and legal issues.

Top 10 Malware Threats - May, 2010Security software company, Sunbelt Software, in its monthly malware threat report, today announced the top 10 most prevalent malware threats detected in May 2010.

Log management and security company, LogLogic, today released a preview of its upcoming log management virtual appliances. The LogLogic Log Management Virtual Appliance is a virtual log management solution, offering enterprise-grade log data collection, search and storage capabilities for companies seeking to improve business operations, enhance security and meet compliance requirements. The virtual appliances operate on VMWare’s ESX virtual servers as well as on devices running VMWare WorkStation, and VMWare Player.

Security software company, Sunbelt Software, today announced the availability of VIPRE Enterprise for Mac, client software that provides virus protection against Macintosh-specific malicious threats.With VIPRE Enterprise for Mac, users will be able to run both scheduled and on-demand scans and view quarantine and scan history. In addition to protecting against MacOS specific threats, the product will also be able to detect and clean any Windows-specific threats discovered on a Mac system.

Next to anonymity, automation is a cybercriminal’s best friend. Botnets—a network of compromised computers on the Internet under the command and control of a single computer—are a game-changer for e-fraudsters. Cybercriminals with a sufficiently large botnet have the potential computing power equivalent to a supercomputer at their disposal.

As the days lead up to the start of the 2010 World Cup, cybercriminals are busy drafting new scams and tactics to take advantage of the excitement surrounding the global event. The latest scam involves an email saying telling users that their email address has won an award of a large sum of money and a free ticket and hotel in South Africa. An example of the fraudulent email is below:

Event image poster

The leading global conference series for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Learn More

Application Security

Application Security

A critical vulnerability tracked as CVE-2024-34359 and dubbed Llama Drama can allow hackers to target AI product developers.

Cloud Security

Cloud Security

Financial terms were not released but the price tag is expected to be hefty with Exabeam’s most recent valuation pegged at $2.5 billion.