SQL injection attacks becoming more intense

Tuesday, May 13th, 2008

The mass SQL injection attacks we've mentioned here and here are increasing in numbers and we're seeing more domains being injected and used to host the attack files and we believe that there are now more than one group using a set of different automated tools to inject the code. Previously ...

ZoneAlarm ForceField – Virtualized Browser Security

Monday, May 12th, 2008

ZoneAlarm ForceField provides a protective layer around your browser, shielding you from drive-by downloads, browser exploits, phishing attempts, spyware and keyloggers. So your passwords, your confidential information, and your financial data remain protected. While traditional security, such as firewalls, antivirus, and security suites, protects your PC, ZoneAlarm ForceField protects your browser ...

Music Unleashes the Malware Beast

Monday, May 12th, 2008

This definitely won’t be music to the ears of music aficionados who acquire their MP3s from peer-to-peer (P2P) networks, but it’s definitely not something they haven’t heard of either. A host of adware under the guise of media files on P2P networks have been reportedly raking up numbers of victims on ...

Google scans web traffic for nasties

Monday, May 12th, 2008

Google's new Web Security for Enterprise service enables companies in the US and Europe to safeguard their internet traffic with protection against viruses and spyware and malicious URLs. According to Google the system "powered by Postini, stops web-borne spyware and viruses before they infiltrate your network and compromise or disable ...

What a Botnet Looks Like

Monday, May 12th, 2008

Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings. Read the rest of the story and view the map...