In its latest Cybercrime Intelligence Report, Finjan shows how rogueware affiliate networks use SEO techniques to distribute their rogue Anti-Virus Software for profit

Farnborough, United Kingdom, 23rd March 2009 – Finjan Inc., a leader in secure web gateway products and the provider of a unified web security solution for the enterprise market, today announced that its Malicious Code Research Center (MCRC) managed to research one of the rogueware affiliate networks, where members make $ 10,800 a day. In the first issue of its Cybercrime Intelligence Report for 2009, Finjan shows how the rogueware was distributed using search engine optimization (SEO) techniques. Cybercriminals used SEO to optimize the distribution of their rogueware.

Read more: Finjan’s Research Reveals Cybercrime Path to Millions

Managed Authentication Service CRYPTO-MAS Honoured by Network Computing

CRYPTOCard, a leading vendor of two-factor authentication (2FA) solutions, has been voted Managed Services Provider of the Year 2009 by the readers of IT publication, Network Computing, for its CRYPTO-MAS service.

Neil Hollister, CEO of CRYPTOCard, comments; “We are incredibly proud of this achievement, which recognises not just the strength of the service, but also the people and partners that work so hard to deliver the customer service that supports its success.”

Read more: CRYPTOCard Voted Managed Services Provider of the Year 2009

Savvy consumers shouldn’t rely on the Paypal’s Protection for Buyers, which includes the Buyer Complaint Policy and Paypal Buyer Protection for eligible ebay purchases. 

Paypal  have a tendency to frustrate both buyers and sellers by closing disputes for reasons only known to them.  Additionally, their Protection for Buyers imposes over-restrictive time limits, has significant exclusions and has some major limitations: 

Read more: Paypal Protection Gives Online Shoppers False Sense of Security

Credant warns mobile phone users are loading the device that could blow their world apart (Cartoon available to accompany this story)

London 18th March - According to the findings of a survey by endpoint data protection security experts, Credant Technologies, 80% of phone users store information on their phones that could easily be used to steal their identities. The research surveyed 600 commuters at London railway stations about their mobile phones, typical usage and the types of sensitive information stored on them. The results were horrifying :

Read more: Phone Data makes 4.2 Million* Brits Vulnerable to ID Theft

London 17th March 2009 - Cyber-Ark, the digital data vaulting expert, says the deletion of more than 10,000 Government records in Australia's Northern Territory by the drunken ex-fiancee of an IT staffer highlights the need for protection of critical user IDs and passwords.

 "Reports are coming in of the deletion of 10,475 user accounts on the Northern Territories' health, court and prison service's computer systems in a drunken rage after one member of IT staff terminated a relationship with another IT employee," said Mark Fullbrook, Cyber-Ark's UK and Ireland Director.
Read more: Australian Government data deletion fiasco easily avoided