Please turn on your JavaScript for this page to function normally.
2008 promises exceptional demand for professional certification

(ISC)2 has expanded its global education offerings to support the next phase of Department of Defense (DoD) Directive 8570.1 — a phase that will involve an unprecedented …

2/3 of people worried about information shared on Facebook

Research conducted by IT security and control firm Sophos has revealed that fifty percent of workers are being blocked from accessing Facebook by their employers who are …

File containing confidential data from 30,000 users

A version of Apophis, a tool used by cyber-crooks to handle information stolen from users infected by several variants of the Nuklus family of Trojans, stores data belonging …

MacNikto: Working with the Nikto Web Server Security Scanner on the Mac

Nikto is an open source web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, …

Windows patch updates blamed for Skype problems?

Although a Russian security forum speculated about a possible exploit that caused major problems for the Skype network, Skype announced the following: “On Thursday, 16th …

Secure USB 2.0 drives with hardware-authentication lock

Corsair launched the “Flash Padlock” family of affordable USB 2.0 drives, the safest way to secure your data while on the go. Priced starting at only $29.99 USD …

Latest malware threat roundup and forecast PDF report

Trend Micro today published the TrendLabs Semi-annual Threat Roundup and Forecast. Analyzing malware trends that influence the economic growth of the malware world, the report …

New book – “Securing Ajax Applications”

Securing Ajax Applications covers basic security techniques and examines vulnerabilities with JavaScript, XML, JSON, Flash, and other technologies. Wells, also, clearly and …

Computer Forensics Library Boxed Set

“Computer Forensics Library Boxed Set” includes three previously published books: “Forensic discovery” (020163497X): Definitive guide that presents a …

Know Your Enemy: Malicious Web Servers

Today, many attackers are part of organized crime with the intent to defraud their victims. Their goal is to deploy malware on a victim’s machine and to start collecting …

Worm with SMTP and dialer engine

The focus of this week’s PandaLabs report are RegisteredLetter.A worm and ZLFake.A backdoor. RegisteredLetter.A is designed to make a series of changes on infected …

Snort creator acquires ClamAV open source network anti-virus project

Sourcefire announced that it has acquired ClamAV, a leading open source gateway anti-virus and anti-malware project. Sourcefire’s first acquisition since its Initial …

Don't miss

Cybersecurity news