WordPress.com target of extensive DDoS attack

WordPress.com target of extensive DDoS attack


WordPress.com target of extensive DDoS attack

Posted: 04 Mar 2011 06:47 AM PST

WordPress.com has been targeted by an extensive DDoS attack, and the million of blogs it hosts have been temporarily unavailable or have been experiencing occasional disruptions because of it. The...

The Spam King is free again, claims his spamming days are over

Posted: 04 Mar 2011 06:06 AM PST

Robert Soloway, one of the most prolific spammers whose activities earned him the nickname Spam King, has been released from prison after a little less than 4 years inside. He is allowed to go ba...

Vulnerability scanning and research

Posted: 04 Mar 2011 06:00 AM PST

Cristian Florian is a product manager at GFI Software in charge of GFI LANguard, a network security scanning and patch management solution. In this interview he discusses vulnerability scanning and re...

Trojans still top malware threat

Posted: 04 Mar 2011 05:02 AM PST

Continuing a trend observed since last summer, the same types of Trojan horse programs have persistently dominated the threat landscape through February, according to GFI Software. Statistics show ...

Simple protection steps from credit card fraud

Posted: 04 Mar 2011 04:37 AM PST

Every year, cybercriminals steal billions of dollars from unsuspecting computer users and companies by committing credit card fraud. Although this activity was once relegated to pick-pocketers an...

Internet fraudsters jailed for online criminal forum

Posted: 03 Mar 2011 10:06 PM PST

A group of young internet fraudsters who set up an online criminal forum which traded unlawfully obtained credit card details and tools to commit computer offences were jailed for a total of 15 and ha...

Event: 11th Central European Conference on Cryptology

Posted: 03 Mar 2011 07:30 PM PST

The aim of the conference is to bring together people interested in discussing recent advances in all areas of cryptology. The conference will cover a wide range of cryptology including symmetric a...

0 comments:

Post a Comment