>>> BLACK FRIDAY 2025 cybersecurity deals to explore <<<

Please turn on your JavaScript for this page to function normally.
Identifying suspicious URLs

This video explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated …

Emerging threats in the end user environment

New social networking technologies, mobile devices and a more flexible and tech-savvy workforce are leading to increasingly complex and diverse end user environments with many …

Open source IDS Suricata 1.0 released

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Suricata is the result of …

Free browser security testing service

Qualys announced a free service, Qualys BrowserCheck, that scans web browsers looking for security flaws within the browser and its plug-ins. Security flaws in modern web …

10 steps for safe web surfing

For the millions heading out on vacations ranging from long-distance travel to short daytrips to the beach, or finalizing plans for them, the Internet is an important …

Nmap 5.35DC1 released

Nmap is a free and open source utility for network exploration or security auditing. Nmap 5.35DC1 includes 131 NSE scripts (17 new), 6,622 version detection signatures, 2,608 …

Personal identity protection from McAfee

McAfee launched McAfee Identity Protection, one of the most comprehensive and easy to use identity protection services on the market. The product features proactive identity …

IBM delivers proactive network security

As today’s threat landscape continues to evolve and become more complex, IBM is introducing a new security appliance to help clients more easily adopt an IT …

Top 12 spam-relaying countries

Sophos has published its latest report into the top twelve spam-relaying countries, covering the second quarter of 2010. The United States continues to be the number one spam …

Week in review: New ZeuS version and multi-stage attacks cyber attacks

Here’s an overview of some of last week’s most interesting news and articles: When identity theft is not your fault It is definitely true that you should be …

Can you trust a product that doesn’t have the right certification?

There are numerous organizations who, when looking for a new solution, will draw up a list of attributes products must have to proceed to the evaluation phase. FIPS …

Eurephia: Authentication plug-in for OpenVPN

Eurephia is an authentication plug-in for OpenVPN. OpenVPN is a simple but yet powerful application to create secure VPN connections between computers and networks. OpenVPN …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools