Please turn on your JavaScript for this page to function normally.
CORE IMPACT Pro integrates with Metasploit Project

Core Security Technologies has created a fully supported technical integration between CORE IMPACT Pro and the Metasploit open-source exploit framework. Through the …

Secure Internet browser: Comodo Dragon

Comodo released its new Internet browser, the free Comodo Dragon which is constructed on the open source Chromium Project browser. Dragon’s enhancements increase …

Tokenization: A new approach to enterprise data security

As enterprises seek to protect data from cybercriminals, internal theft or even accidental loss, encryption and key management have become increasingly important and proven …

BruCON 2010 call for papers

BruCON is a 2-day security and hacking conference held in Brussels (24 & 25 September 2010), full of interesting presentations, workshops and security challenges. Help …

Minimalist server monitoring

Anfibia Reactor is a web-based server monitoring solution that oversees the CPU, memory, battery, hard drives, makes sure network connections are working, checks databases, …

F-Secure protects Android users

F-Secure released Anti-theft for Mobile and Mobile Security, which includes the Browsing Protection feature, for smartphones on the Android platform. Today’s smartphones …

Rogue software details: Security Essentials 2010

Security Essentials 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Week in review: Aurora malware, cyber war games and 0-day vulnerabilities for sale

Here’s an overview of some of last week’s most interesting news and articles: Biggest Chinese hacker training site taken down Black Hawk Safety Net, which offered …

Rogue software details: MalwarePro

MalwarePro is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Google Buzz for spammers

The Google Buzz sign-up is being advertised to users when logging into Gmail, and is a fairly transparent process to users with an existing Gmail account. Clicking on …

Critical infrastructure is a primary cybercriminal target

Critical infrastructure such as energy, pharmaceutical and government assets are more than twice as likely to be targeted by cybercriminals than other organizations, according …

Security advice for Valentine’s Day

Malware that uses Valentine’s Day as a lure to trick users and infect computers is now a well-established feature of the IT security calendar. Once again, it will be no …

Don't miss

Cybersecurity news