The pattern is known from years and years of similar experiences: A security researcher publishes an exploitable flaw in software or announces the vendor(s)...
Exploits target specific vulnerabilities in the software running on a system.
After last weeks appearances in the Storm Worm world, we have found new threats emerging on the same storyline.
The Bagle worm is a piece of malware that spreads by itself over email, disk drives and network shares. It has rootkit capabilities that enable it to hide from...
System administrators whose boxes are running on Linux have recently reported a massive wave of attacks on the famous SSH port (also known as Port 22).
We will define an e-threat as being a general term for any type of threat, be it malware, spyware, adware, grayware, hacktool and so on.
We know, it's sad but true. Our last weeks super-star,
As technology gets cheaper and cheaper, the number of personal computer rapidly escalates.
Backdoors are security risks that allow attackers to remotely and stealthily access a computer using either plain-text or fully visual interfaces.