Please turn on your JavaScript for this page to function normally.
Rogue security software database

Rogue security applications, often referred to as scareware, are rising at a rapid rate, posing one of today’s greatest security challenges to computer users. Taking the …

Kaspersky releases Password Manager

Every day an active user will encounter a large number of online services and programs which require authorization. In order to access email, instant messaging services, …

Wireless network detector Kismet 2009-11-R1 released

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) …

Microsoft’s security patches year in review: A malware researcher’s perspective

It’s no secret that Microsoft has had the lion’s share of security vulnerabilities. Its success as a company has made it the most obvious and profitable target for …

Nessus 4.2 released

Nessus is a vulnerability scanner which in version 4.2 includes several enhancements including a new Flash-based interface. With this interface, scan results and policies are …

Top 10 holiday threats

As the holidays bring an increase in online shopping, charitable giving and social interaction, consumers and businesses should be on guard against some common scams that …

Security fix in Ruby on Rails 2.3.5

Ruby on Rails 2.3.5 was released over the weekend which provides several bug-fixes and one security fix. It should be fully compatible with all prior 2.3.x releases and can be …

Visualize network packets with Pkviz

Pkviz is a tool for plotting and cycling through and animating a series of network packets captured by tcpdump. What makes it unique is that the packets’ structure is …

Privacy and security: A fine balancing act

ENISA has just published a seven minute video overview of the recent NIS Summer School 2009. The short documentary follows up on the topic of this year’s event – …

Staying ahead of the cybercriminal

There has been a lot of talk this year about the increasing sophistication of cybercrime threat – even going so far as to claim that virus creation has moved into the …

Week in review: IE vulnerabilities, iPhone anti-virus and security threats for 2010

Here’s an overview of some of last week’s most interesting news, interviews and articles: Workers stealing data for competitive edge 85% of people admit they know …

Invasive vs. non invasive web application security scan

When evaluating an automated web application security tool, such as Acunetix WVS, the first two questions that typically one would ask are “Does this tool perform an …

Don't miss

Cybersecurity news