Please turn on your JavaScript for this page to function normally.
Security for virtualized and cloud computing

Catbird announced vSecurity 5.0 that integrates directly with the hypervisor to provide automated control, visibility and efficiency. Its vCompliance engine monitors and …

Pwn2Own 2012: Changed rules, bigger prizes, no more mobile hacks

Pwn2Own, one of the most anticipated hacking contests that takes place each year at the CanSecWest conference in Vancouver, British Columbia, is set to unfold under …

Kelihos malware author, botnet herder named by Microsoft

Microsoft has named a new defendant in the ongoing Kelihos case. His name is Andrey N. Sabelnikov, of St. Petersburg, Russian Federation, and is believed to have written the …

Unique Web malware hosts increase

The proper security tools can prevent infection or stop outbreaks, mitigate or reduce losses from malicious events, and even decrease legal liability. These products can also …

Interactive networking stack debugger

The new P+ 1000 embedded packet debugger provides ability to control and interact with networking designs and is priced for the individual engineer. It offers packet-by-packet …

Network Security First-Step, 2nd Edition

With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively …

Researchers demonstrate tragic state of SCADA security

Since the discovery of Stuxnet, we’ve been hearing from a variety of researchers about security vulnerabilities in SCADA computer systems. While some researchers such as …

Online reputation manager suspected of Illegal code injection

For individuals and companies that have a bad online reputation, online reputation management (ORM) services might sound like a good investment. Such services are not illegal, …

Secure collaboration for iPad and iPhone

WatchDox, a provider of secure document access and collaboration solutions, today announced that its users can now securely view and make annotations to documents directly on …

Advanced malware protection with Sourcefire FireAMP

Sourcefire introduced FireAMP advanced malware protection, a malware discovery and analysis solution that analyzes and blocks malware by utilizing big data analytics. Designed …

Tax-themed spam delivers malware

The US Internal Revenue Service kicked off the 2012 tax filing season on January 4, and malware peddlers haven’t waited much to begin targeting users with tax-themed …

DreamHost hacker accessed pool of unencrypted passwords

DreamHost, one of the world’s most popular and well-known web hosting providers, has sent a warning out to its customers saying that one of their databases containing …

Don't miss

Cybersecurity news