HomeCybersecurity

Cybersecurity

Anatomy of a Rootkit Hack

Last November, an eWEEK reader who is an IT executive at a large organization was notified by his companys help desk that the companys...

Mac OS X Will Become a Target, Symantec Warns

Its only a matter of time before Apples newly redesigned Mac operating system becomes a happy hunting ground for malicious hackers, according to a...

Big Security Guns Should Aim Carefully at Adware, Spyware

Its been widely recognized for some time that defining software in the "spyware" and "adware" categories is tricky business, and that these types of...

Spyware Writers Play Cat-and-Mouse with Rootkit Detectors

Security researchers have detected the first sign of a cat-and-mouse game between spyware writers and vendors touting new Windows rootkit detection technologies. Just weeks after...

New Phishing Attacks Offer Cash

A new kind of phishing attack made its debut over the weekend, and experts say this is the first time that online scammers have...

Police Foil $420 Million Keylogger Scam

LONDON—The British Hi-Tech Crime Unit has foiled what would have been one of the biggest computer crimes in history, where thieves attempted to transfer...

Mac OS X: Virus-free—For Now

Heres a piece of news you may not know: There are currently no viruses or malware that specifically target Mac OS X lurking "in...

EdgeSight 3.1 Keeps an Eye on Desktops

Do enterprises want to invest in monitoring the performance and availability of end-user systems? One small company believes that they do, and on Monday...

CSS Support Could Be Internet Explorers Weakest Link

Microsoft will be doing a lot to make developers and customers happy with its pending Internet Explorer release, if partner sources with inside information...

AOL To Modify AIM Terms of Service

America Online Inc. plans to make three small but significant modifications to the terms of service for its AIM instant messaging product to head...