Showing results 1 to 20 of 29

Former PM Brown was 'email hack victim'

Private investigators working on behalf of UK newspapers may have hacked into the emails of Gordon Brown, according to reports.Operation Tuleta, the cybercrime strand of the police response to last year's News International phone hacking scandal, has uncovered the potential hacking of the former prime minister and others, The Independent reported on Monday.

January 2, 2012 by

Anon hackers to expose Aussie cybercops?

A preview leak from a hacking group sympathetic to the cause of Anonymous and Operation Anti-Security, or AntiSec, has today threatened to expose communications between one of Europe's top cybercrime divisions and its global partners including those based in Australia.

July 24, 2011 by

Virtualization software revives dumb terminals, cuts IT costs

With computers growing smarter by the day, why would anyone want to step back more than a decade and fill office cubicles with dumb terminals? The answer is simple - to keep cubicle computers in service longer, uncluttered and free of malware, viruses and hacking programs.

August 27, 2008 by

Another interesting Google acquisition: Postini

Google made the announcement today about their acquisition of Postini for $625 million, a hosted enterprise communication security solution that enables companies to protect their users from things like viruses and phishing attacks. It also provides a robust archiving service that helps organizations stay in compliance with regulations.

July 9, 2007 by

Germany passes 'anti-hacking tools' law

Germany has toughened up its cybercrime laws in an effort to close up loop-holes, including those dealing with denial of service attacks.However, the law, passed on Friday, has drawn criticism for allegedly making illegal the development of dual purpose tools -- programs that can be used for both security research and for hacking.

May 29, 2007 by

ISS Proventia M10

The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.

July 26, 2005 by

Israeli Indictments

I am not totally clear on the prosecution cycle in Israel but I find the indictments just reported interesting. According to the article:The indictments accuse the suspects of industrial espionage, fraudulent receipt, uploading computer viruses, hacking computers with criminal intent, wiretapping, use of wiretaps, invasion of privacy, and managing an unauthorized database.

July 7, 2005 by

Welcome to Threatchaos.com

Worms, viruses, denial of service attacks, extortion, phishing, hacking, parasites, Trojans, system monitors, adware, spyware, the list is growing and keeping track of these threats is a full time job, my job. This site contains my thoughts and analysis of the threats, the security space, and trends in cybercrime.

February 2, 2005 by

IronPort C60

This is an impressive big-company email security solution with top-name antivirus and anti-spam tools. But this market is very crowded, and alternatives do more for less.

November 19, 2004 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories