Please turn on your JavaScript for this page to function normally.
Cisco Press titles for new CCNP certification exams

Cisco Press, the official publisher to the CCNP exams, brings a portfolio of learning and preparation products to the new 2009 CCNP certification exams launched recently by …

Apache SpamAssassin 3.3.0 released

Apache SpamAssassin 3.3.0 is a mature, wide-spectrum, extensible email filtering package deployed by hundreds of thousands of organizations worldwide. Apache SpamAssassin …

Virus writers produce hardware damaging code?

BitDefender identified a new e-threat that combines the destructive behavior of a virus with the spreading mechanisms of a worm. There are two known variants of this virus, …

Devious ransom trojan takes data hostage

Taking data hostage is not a new invention in the world of cybercrime but a trojan currently infecting computers does it in a way that can leave the victim unaware that he has …

TechCrunch compromised by security exploit

Popular technology blog TechCrunch was compromised earlier today and their site was replaced by a message that links to a website offering assorted links to pirated material: …

Collection of penetration testing tools

Complemento is a collection of tools for penetration testing that has been included in BackTrack 4 Final LetDown is a TCP flooder that has an (experimental) userland TCP/IP …

Cybercrime increasing faster than company defenses

Cybercrime threats posed to targeted organizations are increasing faster than many organizations can combat them. Moreover, a new survey suggests the threat of cybercrime is …

Are online profiles a danger to privacy?

The rapid proliferation of the use of social networking sites among adults 45 and older increases the need for awareness and education surrounding identity theft stemming from …

New books: Beautiful Testing, Core Data, RESTful Java with JAX-RS

Beautiful Testing offers 23 essays from 27 leading testers and developers that illustrate the qualities and techniques that make testing an art. Through personal anecdotes, …

Data breach costs increase

The 2009 Ponemon Institute benchmark study examines the costs incurred by 45 organizations after experiencing a data breach. Results were not hypothetical responses; they …

Cloud computing brings changing security risks

Cloud-based services are fast becoming established as a credible alternative to existing server-based IT solutions but organizations are failing to recognize the new security …

Rogue software details: LiveProtection

LiveProtection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Don't miss

Cybersecurity news