Expert analysis
A closer look at East-Tec Eraser 2010
East-Tec Eraser 2010 (v. 9.7) protects your privacy, identity and confidential information while removing all evidence of your computer and online activity. It erases your …
Q&A: Infosecurity Russia. Storage Expo. Documation 2010
Alexandr Vlasov is a recognized expert in information security and personal data, working as a Business Development Executive at Groteck Business Media. In this interview he …
Five steps to cybersecurity risk assessment
Organizations face a constant barrage of cybersecurity threats. Botnets, malware, worms and hacking are just a few things that keep IT managers awake at night, wondering if …
A closer look at AVG LinkScanner for Mac
AVG LinkScanner for Mac (v. 9.0) checks each Web page in real time before it opens on your Mac. It supports Firefox and Safari. It runs silently in the background, and if the …
Q&A: Phishing explained
Dr. Jason Hong is the CTO and co-founder of Wombat Security Technologies, a provider of cyber-security training and filtering solutions. In this interview he discusses …
How hackers target teens
Imperva’s ADC has uncovered a new scheme targeting teens. How does it work? Hackers used a phishing attack to get credentials of the Habbo hotel social network, a social …
Security flaws in Orange/France Telecom software
Several independent security researchers reported this past week that security software from Orange/France Telecom, developed to protect consumers from the negative impacts of …
Winning the browser security battle
Operation “Aurora”, the sophisticated Chinese cyber attack that hit several dozen companies in December 2009, not only compromised the intellectual property of the …
Countering the counterfeiters
Counterfeiting is a huge problem. Luxury goods are a favorite target, but so are vital products including medications and aircraft parts. European researchers have created a …
Do you have what it takes to pass your PCI audit?
With every company reliant on software to run its business, an alarming rise in data breach incidents across industries, but especially credit card processing, means …
What every CEO should know about advanced persistent threats and industrialized hacking
The world of hacking has evolved into two major varieties: industrialized attacks and advanced persistent threats (APT). There has been a lot of discussion around the validity …
A closer look at My Lockbox PRO
My Lockbox PRO (v. 2.0) enables you to hide, lock and password protect almost any folder on your computer. You can use My Lockbox to hide your private data from prying eyes …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd