Please turn on your JavaScript for this page to function normally.
Splunk 4.1.1 brings 90+ fixes

Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …

Identifying suspicious URLs

This video explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated …

Emerging threats in the end user environment

New social networking technologies, mobile devices and a more flexible and tech-savvy workforce are leading to increasingly complex and diverse end user environments with many …

Open source IDS Suricata 1.0 released

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Suricata is the result of …

Free browser security testing service

Qualys announced a free service, Qualys BrowserCheck, that scans web browsers looking for security flaws within the browser and its plug-ins. Security flaws in modern web …

10 steps for safe web surfing

For the millions heading out on vacations ranging from long-distance travel to short daytrips to the beach, or finalizing plans for them, the Internet is an important …

Nmap 5.35DC1 released

Nmap is a free and open source utility for network exploration or security auditing. Nmap 5.35DC1 includes 131 NSE scripts (17 new), 6,622 version detection signatures, 2,608 …

Personal identity protection from McAfee

McAfee launched McAfee Identity Protection, one of the most comprehensive and easy to use identity protection services on the market. The product features proactive identity …

IBM delivers proactive network security

As today’s threat landscape continues to evolve and become more complex, IBM is introducing a new security appliance to help clients more easily adopt an IT …

Top 12 spam-relaying countries

Sophos has published its latest report into the top twelve spam-relaying countries, covering the second quarter of 2010. The United States continues to be the number one spam …

Week in review: New ZeuS version and multi-stage attacks cyber attacks

Here’s an overview of some of last week’s most interesting news and articles: When identity theft is not your fault It is definitely true that you should be …

Can you trust a product that doesn’t have the right certification?

There are numerous organizations who, when looking for a new solution, will draw up a list of attributes products must have to proceed to the evaluation phase. FIPS …

Don't miss

Cybersecurity news