Please turn on your JavaScript for this page to function normally.
New web application firewalls from Fortinet

Fortinet announced two new appliances for its FortiWeb family of web application firewalls – the FortiWeb-1000C, designed for mid-to-large enterprises, and …

Free protection against Blackhat SEO threats

Zscaler released Search Engine Security (SES), a free solution specifically designed to combat Blackhat SEO attacks. Such attacks leverage Search Engine Optimization (SEO) …

Colleges breach students’ sensitive information

College students nationwide can be especially vulnerable to identity theft because they often give out personally identifiable information. Some universities have even been …

VirtualBox: Full virtualizer for x86 hardware

VirtualBox is an open source general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use. Some of the features of VirtualBox are: …

How to render SSL useless

In this video from OWASP AppSec Research 2010, Ivan Ristic from Qualys talks about breaking SSL.

Week in review: Signs of computer infection, iPhone jailbreaking and Facebook mobile privacy

Here’s an overview of some of last week’s most interesting news and videos: Web 2.0 security in the workplace The use of social networking applications has …

Facebook virus hoax spreading rapidly

Sophos is advising Facebook users to think before passing on a virus warning that is rapidly spreading across the social network. A large number of users are currently …

Microsoft Exchange Server 2010 Best Practices

Apply best practices for administering Exchange Server 2010 and SP1 and optimize your operational efficiency. Microsoft Exchange Server 2010 Best Practices captures the …

Managed DNS Service integrate DNS, DHCP and IPAM

BlueCat Networks launched Proteus Cloud Services, a managed DNS service that provides control and central management of external DNS as well as enabling organizations to …

Fighting illegal content on the Internet

Detective Sergeant Michael Moran specializes in the domain of online child exploitation and in his address to the Institute, he focused on Interpol’s role in the fight …

How can I know if my computer is infected? 10 signs of infection

Users are often advised to use an antivirus to check if their systems are infected, but with the current cyber-crime scenario, this is simply not enough. Frequently, it takes …

Remote monitoring tool for social networking activity

Awareness Technologies has expanded its WebWatcher monitoring tool for the social media platforms Facebook and MySpace. WebWatcher allows users to install the software and …

Don't miss

Cybersecurity news