Old viruses shouldn't be thought of as dead and gone but merely lying dormant
By Andrew Donoghue
| November 24, 2003 -- 13:05 GMT (05:05 PST)
| Topic: Security
Top tech HR violations and how to avoid them
iPads to flexible working: HR versus the Millennial generation
Facebook to CRM: Tech trends for sales and marketing pros
The Tech Job We Would All Be Doing If We Had The Bottle
Huawei urges Australia to embrace better Chinese products
Huawei Australia chairman John Lord said Huawei is willing to allow the Australian government to test its products to make this happen.
Human Services says access to identity-matching database would help stop fraud
US sues Edward Snowden over new book
Arrest made in Ecuador's massive data breach
Ecuador police arrest director of data analytics firm that leaked the personal records of most of Ecuador's population.
If you are a Restaurant Depot customer, don’t open that phishing email
Reports suggest the potential compromise of a mailing list with malicious invoices landing in client inboxes.
Ransomware: Cyber-insurance payouts are adding to the problem, warn security experts
Cyberattackers now pose as business executives to secure security certificates
Certificates can be used to sign-off on malicious payloads and can fetch a lucrative price on the black market.
Gootkit malware crew left their database exposed online without a password
Even cyber-criminal gangs can't secure their MongoDB servers properly.
Skidmap malware buries into the kernel to hide illicit cryptocurrency mining
The Linux malware makes use of a rootkit to disguise itself on infected machines.