Please turn on your JavaScript for this page to function normally.
Comments on 30,000 YouTube videos link to a malicious Web page

This is yet another example of how cyber-criminals are attacking popular Web 2.0 sites to distribute malware. Such attacks have previously been seen, to a lesser extent, on …

Video: The DEFCON Experience

This is a documentary about the experience of first-time DEFCON attendees from the University of Delaware. They traveled from Newark, DE to Las Vegas for DEFCON 16, gave a …

Anti-piracy solution maps route to unlicensed software

V.i. Laboratories upgraded its software anti-piracy platform with new features that help Independent Software Vendors (ISVs) quickly determine who is using their unlicensed …

Amazon now offers physical data transfer

Amazon Web Services (AWS) Import/Export is a new offering that accelerates moving large amounts of data into and out of AWS using portable storage devices for transport. AWS …

State of Web 2.0 use, policies and security worldwide

Websense revealed the findings from a global survey of 1,300 information technology managers across ten countries, asking about their perceptions of Web 2.0 in the workplace, …

BitDefender unveils free editions of several tools

BitDefender announced that many of its most popular security solutions as free editions, available for download. BitDefender Free Edition is an on-demand virus scanner and …

Anti-Malware Testing Standards Organization to analyze anti-malware reviews

The Anti-Malware Testing Standards Organization (AMTSO) has intends to provide public analysis of anti-malware reviews. This analysis will be done by comparing the testing …

Adobe Reader and Acrobat security initiative

Brad Arkin, the Director of Product Security and Privacy at Adobe has outlined their efforts in making sure Adobe comes out with more secure products in the future: 1. Code …

SSH Solutions with CEO George Adams

George Adams, the President and CEO of SSH Communications Security, discusses their solutions for securing and managing data in enterprise networks. This includes the new SSH …

Web film series on cybercrime: “H*Commerce: The Business of Hacking You”

McAfee launched a new Web film series, entitled “H*Commerce: The Business of Hacking You.” The film series was created to expose cybercrime as a serious and …

CA automates essential mainframe security operation

CA announced CA Compliance Manager for z/OS, a platform-resident solution to provide real-time automated policy management of security and compliance events across the IBM …

Enterprise class log management and forensics from Tenable

Tenable Network Security released of Security Center 3.4.4 and Log Correlation Engine 3.2 for general availability. With this release, Tenable now offers enterprise customers …

Don't miss

Cybersecurity news