Please turn on your JavaScript for this page to function normally.
Is code auditing of open source apps necessary before deployment?

Following Sun Microsystems’ decision to release a raft of open source applications to support its secure cloud computing strategy, companies may be wondering if they …

FBI estimates losses of over $150 million to rogue anti-virus

Tthe Internet Crime Complaint Center, a partnership between the FBI and the National White Collar Crime Center (NW3C), reported that “the FBI is aware of an estimated …

Rogue software details: DataDoctor2010

DataDoctor2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

2010 data security trends: External attacks from the inside

Sentrigo announced its top data security trends to watch for in 2010. A new type of threat: External attacks from the inside Generally, companies have viewed attacks as either …

GnuPG 2.0.14 released

The GNU Privacy Guard (GnuPG) is GNU’s tool for secure communication and data storage. It can be used to encrypt data, create digital signatures, help authenticating …

Rogue software details: SecurityCentral

SecurityCentral is a rogue security application. In order to remove it, find out what files and registry entries to look for below. SecurityCentral will prevent execution of …

Adobe patches Flash Media Server

Critical vulnerabilities have been identified in Adobe Flash Media Server (FMS) 3.5.2 and earlier versions. The vulnerabilities could allow an attacker, who successfully …

Intel patches flaws in its Trusted Execution Technology

Invisible Things Lab – who specialize in system-level security – issued yesterday the results of their research in which they describe how flaws in Intel’s …

Tripwire’s top 5 IT security predictions for 2010

With increasingly stringent compliance mandates, the explosion in virtualization interest and adoption, demands for audit reporting, and a spike in security breaches, 2009 has …

7 smartphone security tips

Lookout, a mobile security startup, suggests seven tips to staying safe on your smartphone. Whether you use your smartphone for business or pleasure, securing the computer in …

iPhone security software: Keeper Password & Data Vault

Keeper is yet another password management system for the iPhone platform. I tested the 3.2 version, released in late September 2009. The application requires around 5.4 MB for …

Microsoft Security Update Guide

The Microsoft Security Update Guide was designed to help IT professionals better understand and use Microsoft security release information, processes, communications, and …

Don't miss

Cybersecurity news