Please turn on your JavaScript for this page to function normally.
2013: The year of cyber war or just cyber panic?

At the end of the year experts at G Data SecurityLabs are taking a moment to look both back and forward at IT security, attacks and cyber crime. In 2012, online criminals were …

Exploring data center design innovations

Douglas Alger is Cisco’s IT Architect for Physical Infrastructure. He develops architecture roadmaps, solutions and policies for the physical infrastructure of the …

All-terrain, military-grade next generation firewall

Stonesoft announced its MIL-320 Next Generation Firewall/VPN appliance that provides military-grade network security in a rugged go-anywhere unit. The MIL-320 appliance packs …

Blue Coat delivers visibility and control for networks

Blue Coat Systems introduced new updates for Blue Coat PacketShaper appliances that enable businesses to embrace Web, cloud and mixed-use recreational applications on the …

Not all security devices are created equal

Independent test lab Broadband-Testing released a report on its performance validation of IT network firewall solutions from Cisco Systems, NetPilot, SonicWall and WatchGuard. …

Video: Smart TV 0-day vulnerability

This video by ReVuln demonstrates a 0-day vulnerability in Smart TV, in this case a Samsung TV LED 3D. Smart TV can be used to browse the Internet, use social networks, …

Ultra-secure memory sticks with anti-malware features

Kingston Digital has partnered with ESET and ClevX. The combination extends ClevX DriveSecurity powered by ESET’s proactive portable anti-malware technology to …

DARPA will start testing devices and software for backdoors

The scenario is one that information security experts dread: widespread dissemination of commercial technology that is secretly wired to function in unintended ways or even …

Huge GPU cluster makes password hacking a breeze

Cracking encrypted passwords is getting increasingly easier as researchers come up with new ways of harnessing CPU, GPU and cloud power to perform the task. The latest of the …

Guidance Software unveils fast forensic bridge

Guidance Software announced the Tableau T35u USB 3.0 forensic SATA/IDE bridge for forensic imaging in both lab and field environments. The T35u supports write-blocked, …

Hardcoded account in Samsung printers provides backdoor for attackers

US-CERT has issued an alert warning users of Samsung printers and some Dell printers manufactured by Samsung about the presence of a hardcoded account that could allow remote …

HP delivers server for Big Data

HP unveiled a server built to help clients operationalize Big Data, drive new business opportunities and save up to $1 million over three years. With the advent of Big Data …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools