Please turn on your JavaScript for this page to function normally.
Multiple vulnerabilities in Symantec Endpoint Protection Manager

Multiple vulnerabilities have been discovered in Symantec Endpoint Protection Manager, which can be exploited by malicious people to conduct cross-site scripting and request …

OpenDNSSEC 1.2.2 released

Internet engineers continue to enhance Internet security with the release of OpenDNSSEC, a tool which simplifies the process of signing one or more zones with DNSSEC. …

Identity thief admits stealing $770,000

A Brooklyn, N.Y., man pleaded guilty for his role in managing a credit card fraud operation that operated throughout the East Coast of the United States. Jonathan Oliveras, …

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the …

Adobe patches multiple products

Today, Adobe released the following Security Bulletins: APSB11-19 – Security update available for Adobe Shockwave Player (Critical) APSB11-20 – Security update …

P25 security mitigation guide

In a recent research paper [pdf], we analyzed the security features of the APCO Project 25 (P25) digital two-way radio system. P25 radios are widely deployed in the United …

Bitdefender Mobile Security for Android now with live tracking anti-theft feature

Bitdefender added two major new features to its free Mobile Security for Android Beta. The new anti-theft function allows users to easily track where their device is and to …

Panasonic Toughbook S10 comes with security features

Panasonic announced the Toughbook S10. Powered by an Intel Core i5-2520M vPro processor, it delivers up to 12.5 hours of standard battery life and weighs only 3.0 pounds. The …

A look into Black Hat’s wireless network

Aruba Networks, which provided and maintained the wireless network for last week’s Black Hat USA 2011 conference, today provided some interesting statistics around the …

Half of organizations lost information on USB drives

Inexpensive consumer USB Flash drives are ubiquitous in all manner of enterprise and government environments – typically with very little oversight or controls, even in …

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare explores the battlefields, participants and the tools and techniques used during today’s digital conflicts. The concepts discussed in this book will give …

Microsoft releases 13 security bulletins, fixes 22 vulnerabilities

Today Microsoft released 13 security bulletins, two rated Critical, nine Important and two Moderate. These bulletins address 22 unique vulnerabilities in Internet Explorer, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools