Please turn on your JavaScript for this page to function normally.
Assessing Java Clients with the BeanShell

Assessing the security of Java applications, and particularly client-server applications, can be a tedious process of modifying the code, compiling, deploying, testing and …

What Should Businesses Require of Data Protection Solutions?

Data protection today is one of the most innovative and fast-moving areas of Information Technology. Data protection technology developers have, in recent years, engaged in …

DOJ Deploys AppSecInc’s vulnerability assessment technology

Application Security announced that the United States Department of Justice (DOJ) is utilizing the company’s vulnerability assessment scanner, AppDetective to reduce and …

Sensitive information can still be found on second hand disks

BT, the University of Glamorgan in Wales and Edith Cowan University in Australia today issued a report based on research to determine whether second hand computer disks that …

Worms exploit critical Microsoft security vulnerability

Sophos is warning computer users of malware that is exploiting a critical security vulnerability in Microsoft software, and urging companies to roll-out security patches as a …

Mac Password Generator 1.0 released

Password Generator is a Mac OS X application that allows users to generate strong passwords for all their accounts. Of significant note, this release allows users to customize …

First portable anti-spyware product for U3 smart drive platform

ParetoLogic announced XOFTspy Portable Anti-spyware product, the first portable anti-spyware product operating directly from U3 smart drives. Built on its popular anti-spyware …

New worm claims to show you pictures of Paris

If you get an email from one of your friends, with a subject line-“My Photo on Paris’, do not click and download the zipped attachment. The poor fellow has …

Info on HITBSecConf2006 Capture The Flag contest

Hack In The Box (M) Sdn. Bhd. has announced that it will once again host the region’s best known Capture The Flag hacking competition during the upcoming HITBSecConf2006 …

How to Start Up a Mobile Security Project

The proliferation of laptops, PDAs, smartphones and USB sticks means that corporate data is no longer confined to the office. Without a joined-up policy on mobile security, …

Up to one in 600 social-networking pages host malware

ScanSafe has released its latest Global Threat Report on Web filtering, spyware and viruses According to an analysis of more than five billion Web requests in July, ScanSafe …

Warning of a serious BlackBerry security threat

Secure Computing Corporation warn that organizations that have installed their BlackBerry server behind their gateway security devices could be subject to a hacking attack …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools