Please turn on your JavaScript for this page to function normally.
Web browsers leave ‘fingerprints’ as you surf

An overwhelming majority of web browsers have unique signatures – creating identifiable “fingerprints” that could be used to track you as you surf the …

Cryptmount: Create and manage secure filing systems on Linux

Cryptmount is a utility for GNU/Linux operating systems which allows an ordinary user to mount an encrypted filing system without requiring superuser privileges. It is aimed …

Rogue software details: CyberSecurity

CyberSecurity is a rogue security application. In order to remove it, find out what files to look for below. Known system changes: Files c:\Desktop\Cyber Security.lnk Folders …

A closer look at Carbon Copy Cloner

If you care about your data, you should consider backups as essential, not just important. Apple did a lot for the average user with the introduction of Time Machine, but …

Anonymity, privacy and circumvention with Tor

Below you can watch Jake Appelbaum’s presentation from SOURCE Boston 2010.

AT&T and McAfee offer secure e-mail gateway

As spam and other e-mail security threats continue to inundate organizations’ daily operations, AT&T has announced a new network-based solution, AT&T Secure …

Linux 2.6.34 released

Linux 2.6.34 has been released. This version adds two new filesystem, the distributed filesystem Ceph and LogFS, a filesystem for flash devices. Other features are a driver …

Facebook users hit by video attack

Facebook users should be wary following a video attack on users this weekend designed to infect computers with adware. Thousands have been hit by the attack which posted a …

Week in review: KHOBE attack, Facebook security and the biggest phishing crime syndicate

Here’s an overview of some of last week’s most interesting news and articles: phpnuke.org compromised, serving exploits PHP-Nuke is a popular Web content …

Twitter-controlled botnet SDK at large

Huge armies of zombified computers unanimously executing the commands sent by their master – that’s what comes in the mind of a computer user at the sound of the …

Black swans, secure access and business continuity

If you’d looked through the contingency plans of the world’s top 500 companies in March of this year, it’s unlikely you’d have found a scenario that …

Real-world data on software security initiatives

Cigital announced an updated release of the “Building Security In Maturity Model” (BSIMM) study, which significantly expands the data defining benchmarks for …

Don't miss

Cybersecurity news