Please turn on your JavaScript for this page to function normally.
Download the new edition of global information security resource guide

(ISC)2 announced the release of its complimentary “2008 Resource Guide for Today’s Information Security Professional, Global Edition”. This 132-page guide …

P2P file sharing 2008’s greatest identity theft threat?

According to the Identity Theft Assistance Center (ITAC), throughout 2008 “criminals will continue to exploit new technologies to commit identity theft.” At the …

Blood bank’s laptops with sensitive information reported stolen

Two laptop computers are missing from Lifeblood blood bank’s possession and presumed to be stolen. The dual-password protected laptops were used on mobile blood …

High performance SSH/SCP – HPN-SSH

SCP and the underlying SSH2 protocol implementation in OpenSSH is network performance limited by statically defined internal flow control buffers. These buffers often end up …

Video: Rogue antispyware applications

Guys from F-Secure show how to find rogue antispyware applications by using Google search.

Microsoft releases five critical security bulletins

Another Patch Tuesday and Microsoft comes out with a variety of patches, and this series is quite serious. Users are recommended to update as soon as possible. The critical …

Downloaders may piggyback on unsecured WLAN to flout new UK laws

Sophos is warning computer users of the importance of properly securing their Wi-Fi networks following reports that people who illegally download music and films may have …

Research shows that identity fraud is in decline

The 2008 Identity Fraud Survey Report – released by Javelin Strategy & Research – confirms that identity fraud is declining in most parts of the United …

Spybot Search & Destroy

Spybot Search & Destroy is one of the most used standalone solutions for protecting against different malware threats. This is a review of version 1.5.2 that was released in …

Report: Web browsers under siege from organised crime

IBM today released the findings of the 2007 X-Force Security report, detailing a disturbing rise in the sophistication of attacks by criminals on Web browsers worldwide. …

The Need for a New Security Approach

Historically the goal of security for most companies was nice and simple: keep the bad guys out. And it was easy to classify who the bad guys were. The bad guys were everyone …

Apple released security update 2008-001

The fresh security update addresses the following: Directory Services – A local user may be able to execute arbitrary code with system privileges. A stack buffer …

Don't miss

Cybersecurity news