Please turn on your JavaScript for this page to function normally.
A closer look at AxCrypt 1.6.3

AxCrypt is one of the best open source file encryption software for Windows. It integrates seamlessly with Windows to encrypt, decrypt, store, send and work with individual …

Who poses the biggest network threat?

Sophos revealed new research into the types of users businesses fear most likely to expose their networks to IT threats. The research shows that 31 percent of companies …

Barracuda Networks and open source intellectual property protection

Barracuda Networks signed a license agreement with the Open Invention Network (OIN) and joined the growing list of companies who are supporting OIN to ensure Linux-based and …

Attacking the Build through Cross-Build Injection

A poorly designed software build process can allow an attacker to insert malicious code into the final product or to take control of a build machine. This paper surveys …

CompTIA survey reveals one-fifth of tech budgets now allocated for security

Spending on security technology, training, assessments, and certification now accounts for one-fifth of total technology budgets, according to research from the Computing …

Microsoft releases four critical security bulletins

Another Patch Tuesday and Microsoft comes out with a variety of patches, and this series is quite serious. The critical vulnerabilities are in: Windows, Outlook Express, …

Two FREE CSI 2007 three-day conference passes for HNS readers

We have a couple of complimentary access passes to the upcoming CSI 2007. The conference will be held November 5-7 in suburban Washington, DC. These full three-day conference …

Forensics edition of Password Recovery Bundle

Russian password experts Elcomsoft recently released Password Recovery Bundle – Forensics Edition. This software suite includes the high-end versions of all of …

New WhiteHat website security statistics report

Web application security experts at WhiteHat released a new Website Security Statistics Report – the aggregate vulnerability data they’ve collected when assessing …

Trojans top the charts in September

Trojans have held off worms and bots to top the charts as the most active type of malicious code, according to data compiled by Panda’s ActiveScan online antivirus …

Nigerian email scammers now using puppies

Sophos has reminded computer users of the danger of email scams following an attempted financial fraud which posed as a communication from a Christian couple offering their …

Good S/MIME – Good Mobile Messaging Secure Multipurpose Internet Mail Extensions

Motorola recently introduced Good Mobile Messaging Secure Multipurpose Internet Mail Extensions (Good S/MIME). Designed specifically to meet federal government security policy …

Don't miss

Cybersecurity news