Please turn on your JavaScript for this page to function normally.
Secunia Vulnerability Intelligence Manager 3.1 released

Secunia announced enhancements to the award-winning Secunia Vulnerability Intelligence Manager (VIM). The Secunia VIM is compliant with the vulnerability database requirements …

7 steps to protect against online fraud

Of the three million respondents to a SonicWALL quiz, only 7.4% answered all of the questions correctly. When asked to determine whether a suspect email was a phishing e-mail …

IEEE launches 40Gb/s ethernet optical interface standard

IEEE announced the ratification of IEEE 802.3bgTM-2011, 40Gb/s Ethernet Single-mode fiber optical interface, a new standard enabling 40 Gb/s serial Ethernet interfaces to be …

New HP application security solutions

HP announced the first application security analysis solution that discovers the root cause of software vulnerabilities by observing attacks in real-time. HP Fortify Real-Time …

B-Sides Vienna welcomes hackers in June

B-Sides Vienna is a hacker conference targeted at security researchers, system and network operators, application developers, hardware hackers, hackerspace members, and …

Maturity model for information security management

The Open Group announced a new information security management standard, The Open Group Information Security Management Maturity Model (O-ISM3), which enables the creation of …

Network security blunders: Tales from the field

We’ve all made one in our career, I’m talking about that blunder you thought you would be fired for. My first blunder was rebooting all the campus router pairs at …

Week in review: Epsilon breach, MITM attacks and the execution of the RSA hack

Here’s an overview of some of last week’s most interesting news, reviews, videos and articles: The execution of the RSA hack More than two weeks have passed since …

Cain & Abel 4.9.40 released

Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …

Hacking Unified Communications security

A fundamental shift in the IT security world has taken place. It is the common thread running through these real-world case studies: 1. An enterprise telecoms manager at a …

Uptick in rogue Facebook applications

GFI Software announced the top 10 most prevalent malware threats for the month of March 2011. GFI researchers found that the Japanese tsunami, earthquake and subsequent …

Smartphone users feel more secure than PC users

Many users feel more secure using smartphones to surf the Internet than PCs, and a majority consider the risk of losing personal data higher on computers than on smartphones, …

Don't miss

Cybersecurity news