Please turn on your JavaScript for this page to function normally.
Why Dropbox’s security changes are going to improve cloud computing

On July 1, Dropbox announced a revision to its terms of service, privacy policy and security overview document. While the intention of the update was to make Dropbox’s …

Spammers switch to compromised accounts, shift away from botnets

Spammers today favor compromised accounts for sending spam, gradually shifting distribution away from botnets, according to Commtouch. The changed tactic has emerged as spam …

140,000 children could be identity fraud victims

For most people, the thought of their children being victims of identity fraud is even more chilling than being a victim themselves. While children are less at risk for …

Critical vulnerability in Sun Java

ACROS Security has discovered a vulnerability in Sun Java, which can be exploited by malicious people to compromise a user’s system, according to Secunia. The …

How to secure a moving target with limited resources

Today, as security threats increase and regulatory requirements grow more complex, businesses are recognizing that compliance and security are business-critical priorities. …

An examination of malware ecosystems

Malware delivery networks are typically hosted across multiple sites and are responsible for launching dynamic attacks on unsuspecting users. A new Blue Coat report examines …

Law enforcement winning the battle against cybercrime

June was a difficult time for cybercriminals as it saw some notable successes for various law enforcement agencies in the war on cybercrime, according to Kaspersky Lab’s …

New voice identification technology

Neurotechnology introduced VeriSpeak, a new voice identification technology, available in the VeriSpeak SDK and as a new voice identification. VeriSpeak combines voiceprint …

CentOS 6.0 released

CentOS 6.0 for i386 and x86_64 architectures is now available. It is based on the upstream release EL 6.0 and includes packages from all variants. All upstream repositories …

Metasploit: The Penetration Tester’s Guide

The free and open source Metasploit Framework is the most popular suite of penetration testing tools in the world, with more than one million downloads yearly. Metasploit: The …

Week in review: Washington Post Jobs site and Fox News Politics Twitter account breached

Here’s an overview of some of last week’s most interesting news, reviews and articles: Breached Fox News Politics Twitter account announces Obama’s death A …

Speaker line-up for B-Sides Las Vegas 2011

Security B-Sides announced the event details and speaker lineup for B-Sides Las Vegas 2011, being held August 3-4, 2011 at The Artisan Hotel Boutique from 9 a.m. – 6 …

Don't miss

Cybersecurity news