Please turn on your JavaScript for this page to function normally.
Monitor Mac OS X services on your iPhone or iPad

With Server Admin Remote IT administrators can monitor the alive status of Mac OS X Tiger, Leopard and Snow Leopard Server services, start/stop services and observe the …

Week in review: Social engineering, Facebook clickjacking and a new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news and articles: Automated social engineering PoC successful on Facebook and IRC In order to reach a …

Apple updates Mac malware protection

Researchers at Sophos discovered that Apple updated the anti-malware protection built-into Mac OS X when it released a new version earlier this week. Mac OS X 10.6.4 has been …

Microsoft fights online fraud with new program

Microsoft released a new program that will help mitigate potential losses due to online fraud and account compromise. Internet Fraud Alert offers a trusted and effective …

HTTPS Everywhere Firefox extension: Encrypt the Web

HTTPS Everywhere is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a …

Rogue software details: Defense Center

Defense Center is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Security flaws in Orange/France Telecom software

Several independent security researchers reported this past week that security software from Orange/France Telecom, developed to protect consumers from the negative impacts of …

LiveVault 7.0: Application and server backup

Iron Mountain announced LiveVault 7.0, a fully managed, cloud-based data protection solution with proactive administration and monitoring. The latest version of LiveVault …

Juniper Networks releases Junos Pulse and AppTrack software

Juniper Networks announced Junos Pulse and AppTrack software. Junos Pulse is a dynamic, standards-based, integrated multi-service network client that allows the IT staff to …

Enterprise malware threat detection and response

HBGary and Verdasys announced an integrated enterprise security solution to detect and control malware threats. Available in July, the solution will feature HBGary’s …

WordPress 3.0 released

WordPress 3.0, the thirteenth major release of WordPress and the culmination of half a year of work by 218 contributors, is now available for download and comes with 1,217 bug …

Text message phishing attacks drop significantly

Text-to-phone phishing attacks (often called “smishing”) dropped dramatically in the first quarter of 2010, according to a report by Internet Identity (IID). …

Don't miss

Cybersecurity news