Please turn on your JavaScript for this page to function normally.
CompTIA expands Security Trustmark Program

CompTIA expanded its Security Trustmark program to include two levels of the business accreditation, which identifies companies that follow industry-accepted best security …

Anonymous member charged with computer offences

Peter David Gibson, 22, has been charged with conspiracy to do an unauthorized act in relation to a computer, with intent to impair the operation of any computer or prevent or …

The importance of data de-identification in the risk assessment framework

Dataguise highlighted recent research and analysis showing that de-identification through data masking is an important aspect of a company’s overall risk assessment …

KillSwitch technology catches brute-force attacks

Confident KillSwitch is an authentication technology that can identify and proactively defend against brute force attacks on account logins, password reset processes, …

Windows 7 Inside Out

Windows 7 Inside Out, Deluxe Edition is updated with 300+ new pages of information for working with Windows 7. This comprehensive reference to Windows 7 packs hundreds of …

Have you been hacked this month?

I’m assuming the majority of people are sitting smugly reading this thinking “of course I haven’t!’ You do everything you’re supposed to do, …

PHP 5.3.8 fixes security issues

The PHP development team released PHP 5.3.8. This release fixes two issues introduced in the PHP 5.3.7 release: Fixed bug #55439 (crypt() returns only the salt for MD5) …

ICSA Labs to certify broadband home routers

Hackers are increasingly viewing home routers as a means of gaining access to sensitive personal data. To help combat this threat, ICSA Labs is offering a new program under …

Five mistakes companies make in their cloud strategies

When a company doesn’t fully define what the cloud can do for it, it leads to a less-than-optimized strategy that under serves the organization. To help IT pros avoid …

The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to …

Malware targeting Android jumps 76 percent

The amount of malware targeted at Android devices jumped 76 percent since last quarter, to become the most attacked mobile operating system, according to McAfee. 2011 has also …

$100,000 for open source security projects

Rapid7 created a $100,000 investment fund to support up to seven promising open source projects in the security industry. The “Magnificent7” projects will be …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools