Please turn on your JavaScript for this page to function normally.
Info on HITBSecConf2006 Capture The Flag contest

Hack In The Box (M) Sdn. Bhd. has announced that it will once again host the region’s best known Capture The Flag hacking competition during the upcoming HITBSecConf2006 …

How to Start Up a Mobile Security Project

The proliferation of laptops, PDAs, smartphones and USB sticks means that corporate data is no longer confined to the office. Without a joined-up policy on mobile security, …

Up to one in 600 social-networking pages host malware

ScanSafe has released its latest Global Threat Report on Web filtering, spyware and viruses According to an analysis of more than five billion Web requests in July, ScanSafe …

Warning of a serious BlackBerry security threat

Secure Computing Corporation warn that organizations that have installed their BlackBerry server behind their gateway security devices could be subject to a hacking attack …

DesktopSecure for Linux for Ubuntu 6.06 LTS available

Following the launch of Ubuntu 6.06 LTS earlier this month, Canonical made Panda Software DesktopSecure for Linux available to all users of Ubuntu 6.06. Combining the security …

Microsoft patches 9 critical vulnerabilities

Microsoft alerted us this time about 12 vulnerabilities of which nine were rated critical and three important. There are vulnerabilities in the Server service, the DNS …

The Cult of the Dead Cow starts community based web application for malware analysis

The Cult of the Dead Cow (cDc), a prominent technology activist group, announced a new application designed to collect, analyze, and ultimately help defeat malicious software. …

Majority of workers ignore the risks of web links and attachments in emails

A survey into the habits of 142 UK office workers conducted by Finjan, the global provider of best-of-breed proactive web security solutions, has uncovered that although they …

Latest email scam offers JFK assassination secrets for sale

IT security firm Sophos has warned computer users to be wary of an email claiming to come from a dying KGB agent, offering to pass on secrets of the John F Kennedy …

New identity theft and online fraud techniques

Authors of computer viruses and threats -including phishing scams- are looking for direct financial profit from cybercrime. For this reason, they are using more innovative and …

10 Tips for Reducing Storage TCO

Relying on big vendors to design and implement your storage systems is often considered a safe approach. However, it allows vendors to take control over your storage systems …

Two-factor authentication solution for OpenVMS systems

Process Software announced that it has achieved technical interoperability certification between the VMS Authentication Module and RSA SecurID two-factor authentication …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools