Please turn on your JavaScript for this page to function normally.
PCI compliance and vulnerability scanning suite for just $99

Research published recently within the security industry confirms that, while PCI is important, it is only one part of a larger vulnerability management framework for …

The State of Database Security

Ted Julian is the VP of Marketing and Strategy at Application Security Inc. In this video he discusses the current state of database security and offers some insight on what …

API for OpenSSL developers to add elliptic curve cryptography to their applications

Certicom announced Security Builder API for Open Source to help OpenSSL developers easily add elliptic curve cryptography (ECC) to their applications. The SSL shim, or …

“Mind Games” – a psychology study on cyber criminals

In the study titled “Mind Games,” the primary author, Dr. James Blascovich, Professor of Psychology at the University of California, Santa Barbara, offers analyies …

Log-on to Windows computers with your fingerprint

IOGEAR just released Personal Security Mouse with Nano Technology (GMEFP1W6), a solution offering fingerprint scan to log-in to a computer Additional features include file / …

Season of security product beta testing contests

A couple of days ago we covered BitDefender’s new beta testing program where breaking their software could get you techie gear such as Sony Playstation 3, Microsoft …

Spammers deflate Pump and Dump spam tactics

According to the security provider Marshal, pump ‘n dump spam has dropped significantly. Stock spam now represents five percent of all spam compared to 50 percent in …

New Trend Micro security enhancement package for Windows Vista

Trend Micro today announced the availability of Trend Micro OS Protection, a security enhancement package for Windows Vista users running Trend Micro Internet Security. This …

Poison Ivy can take over your computer

The malware named PoisonIvy.r comes into computers through various online utilities, dubious software programs and movie downloads from infected websites. MicroWorld experts …

A closer look at Eraser, a secure data removal tool

Eraser is a secure data removal tool for Windows. It completely removes sensitive data from your hard drive by overwriting it several times with carefully selected patterns. …

Firefox Security and Privacy Extensions

In the last few years Firefox gained a massive support from surfers worldwide. This is mainly because Internet Explorer, still the biggest player on the market, has proved to …

Dirty duo guilty of obscene spam act

Jury convicts two men on multiple charges including fraud and transportation of obscene materials IT security and control firm Sophos has welcomed news that two men have been …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools