Please turn on your JavaScript for this page to function normally.
Searching for evil

Computer security has recently imported a lot of ideas from economics, psychology and sociology, leading to fresh insights and new tools. I will describe one thread of …

Security update for AirPort Extreme 802.11n base station

A design issue exists in the IPv6 protocol’s handling of type 0 routing headers. Depending on network topology and capacity, the reception of specially crafted IPv6 …

NSA Secure Workstation Solution to use VMware

VMware announced an agreement with General Dynamics C4 Systems, a business unit of General Dynamics, to develop a complete turn-key High-Assurance Platform workstation using …

Best practices to combat SME security threats

SMEs face a different set of security challenges than enterprises and must adapt security policies and practices accordingly to avoid costly intrusions and that can cripple or …

Is PDF spam simply not working for the spammers?

Sophos has reported a dramatic decrease in the amount of spam emails using PDF file attachments to spread their unwanted messages. According to research compiled by …

Up to 59% of companies with active malware on their networks

Some 59% of companies that scanned between 20 and 30,000 PCs with Malware Radar had active malware on their computers, according to Panda Security’s Malware Radar, an …

Security Economics

Information security has finally become mainstream. It is almost a recognized profession, with its own areas of specialization: network security, audit, incident response, …

Symantec releases Norton Internet Security 2008, Norton AntiVirus 2008

Symantec launched Norton Internet Security 2008 and Norton AntiVirus 2008, industry leading security solutions that have been enhanced to provide computer users with …

5 Security Widgets for the Opera Browser

Widgets are Web programs you can run right on your desktop using Opera 9. This article introduces security-related widgets that will enhance your Opera experience. …

Intel vPro processor technology fortifies security

Intel further reinforced desktop PC security by unveiling the newest generation of Intel vPro processor technology for businesses and IT with new innovations that add better …

A closer look at Cryptainer LE: your own secure hidden data vaults

This tool enables you to secure your data and ensure that you are doing the best for your privacy. Cryptainer LE uses 256 bit AES encryption and works by creating multiple 25 …

Video: User Account Control in Windows Vista

Jason Fossen, an instructor at the SANS Institute, discusses the controversial User Account Control in Windows Vista.

Don't miss

Cybersecurity news