Please turn on your JavaScript for this page to function normally.
The Basics of Information Security

As part of the Syngress Basics series, The Basics of Information Security will provide the reader with fundamental knowledge of information security in both theoretical and …

ShredIt X 6 for Mac OS X released

Mireth Technology released ShredIt X 6, its file shredder and hard drive cleaner software for Mac OS X. ShredIt X can be used to erase files, folders, disk free space, …

Week in review: First flaws detected in the AES, Android malware and Internet bad neighborhoods

Here’s an overview of some of last week’s most interesting news and articles: Third-party Firefox add-ons to be blocked automatically Mozilla has decided to put a …

Strategies for effective data analytics

Organizations with effective data analytics can make stronger business decisions by learning what is working and what is not, what they are doing well, and where they need …

Emerging threats: Attacks via MIPS devices

First of all, if something has already been invented and has been seen in-the-wild more than once, it’s very likely to occur again and again, especially if the attacks …

Confidence in online retailers sinks

According to a study of consumer sentiment toward online shopping and security by McAfee, only about a third of online consumers believe that most websites are safe for …

Coding for Penetration Testers

Tools used for penetration testing are often purchased off-the-shelf. Each tool is based on a programming language like Perl, JavaScript, Python, etc. If a penetration tester …

RSA proactively blocks malware threats

RSA announced updates to its CyberCrime Intelligence Service designed to help enterprises monitor and harden their infrastructure against malware infection and data loss. This …

RealPlayer multiple vulnerabilities

Some vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user’s system, according to Secunia. 1. A …

Human Compromise: The Art of Social Engineering

This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …

StealthWatch 6.1 adds internal and external monitoring capabilities

Lancope released a new version of its monitoring platform, the StealthWatch System 6.1. This version increases both the amount and types of flow data that can be processed by …

Integrated content-aware SIEM and firewall

NitroSecurity and Palo Alto Networks have integrated content-aware SIEM and next-generation firewall technology into a complete enterprise security solution designed to …

Don't miss

Cybersecurity news