Please turn on your JavaScript for this page to function normally.
It’s time to be proactive on cybersecurity

In light of recent cyberespionage, the breakup of cybercrime rings, and the threats that sophisticated malware such as Stuxnet present to critical infrastructures, McAfee Labs …

6 million malicious files found in the past 3 months

Malware has reached its highest levels, making the first six months of 2010 the most active half-year ever for total malware production, according to a new McAfee report. At …

Security check for broadband home routers

Attackers are increasingly targeting home routers as a means of gaining access to sensitive personal data. To help combat this threat, ICSA Labs is offering a new program …

64GB secure portable USB drive

MXI Security offers a 64GB capacity device for its Stealth line of secure USB devices, suited for government customers that require high-capacity devices for Secure USB …

Gartner: Worldwide enterprise IT spending to grow

Worldwide enterprise IT spending across all industry markets will grow 2.9 percent in 2010 and surpass $2.4 trillion, according to Gartner. Analysts said that all industries …

Wipe technology for self-encrypting disk drives

Toshiba announced Wipe for Toshiba Self-Encrypting Drive (SED) models, a technology that allows special security capabilities, such as the world’s first ability for …

Tektronix Communications acquires Arbor Networks

Tektronix Communications has signed a definitive agreement to acquire Arbor Networks. The acquisition is expected to close in September and the terms of the acquisition are …

New web application firewalls from Fortinet

Fortinet announced two new appliances for its FortiWeb family of web application firewalls – the FortiWeb-1000C, designed for mid-to-large enterprises, and …

Free protection against Blackhat SEO threats

Zscaler released Search Engine Security (SES), a free solution specifically designed to combat Blackhat SEO attacks. Such attacks leverage Search Engine Optimization (SEO) …

Colleges breach students’ sensitive information

College students nationwide can be especially vulnerable to identity theft because they often give out personally identifiable information. Some universities have even been …

VirtualBox: Full virtualizer for x86 hardware

VirtualBox is an open source general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use. Some of the features of VirtualBox are: …

How to render SSL useless

In this video from OWASP AppSec Research 2010, Ivan Ristic from Qualys talks about breaking SSL.

Don't miss

Cybersecurity news