Please turn on your JavaScript for this page to function normally.
Inside Cyber Warfare, 2nd Edition

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare – without truly realizing the scope …

Week in review: pcAnywhere code leaked, Trustwave revokes “MitM” certificate, and top reasons for IT layoffs in 2011

Here’s an overview of some of last week’s most interesting news, articles and interviews: Compromised DreamHost-hosted websites lead to scams Hundreds of websites …

Romney defeats Gingrich in US spam primaries

Mitt Romney, the former Massachusetts governor who’s leading polls in the race to become the Republican Party’s nominee for the US presidency, is also the favorite …

Free online privacy tool

Abine released Do Not Track Plus (DNT+), a tool that makes it easy for anyone to see when they’re being tracked online and stop being profiled by social networks, large …

MasterCard and Silver Tail Systems combat online fraud

MasterCard and Silver Tail System announced a relationship that will enable merchants to differentiate fraudsters from legitimate consumers in real-time during the online …

Making Embedded Systems

Embedded systems control many devices in common use today, from digital watches and iPods to traffic lights and the systems controlling nuclear power plants. Since …

Top reasons for IT layoffs in 2011

Based on the data obtained with the help of a data leakage control system, and an in-depth analysis of work time usage by staff, the specialists of Falcongaze analytical …

The evolution of targeted attacks and exploit kits

There’s been a significant growth in cybercrime, via sophisticated targeted attacks and social media scams, as well as a rise in malicious email attachments, despite a …

Apple iWork passwords cracked

ElcomSoft can now recover passwords protecting Apple iWork documents. This makes Distributed Password Recovery the first tool to recover passwords for Numbers, Pages and …

ISO 27001 benefits: How to obtain management support

As with any other project, if you do not ensure enough money and human resources, your ISO 27001 project will fail. Therefore, the only way to get those is to get your …

Cybercriminals tailoring tactics for maximum appeal

GFI Software released its report on the most prevalent threat detections encountered during January. Last month saw malware attacks targeting a wide range of potential …

Web app security scanner Netsparker 2.1 released

Netsparker can crawl, attack and identify vulnerabilities in all custom web applications regardless of the platform and the technology it’s built on, just like an actual …

Don't miss

Cybersecurity news