Please turn on your JavaScript for this page to function normally.
Interactive networking stack debugger

The new P+ 1000 embedded packet debugger provides ability to control and interact with networking designs and is priced for the individual engineer. It offers packet-by-packet …

Network Security First-Step, 2nd Edition

With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively …

Researchers demonstrate tragic state of SCADA security

Since the discovery of Stuxnet, we’ve been hearing from a variety of researchers about security vulnerabilities in SCADA computer systems. While some researchers such as …

Online reputation manager suspected of Illegal code injection

For individuals and companies that have a bad online reputation, online reputation management (ORM) services might sound like a good investment. Such services are not illegal, …

Secure collaboration for iPad and iPhone

WatchDox, a provider of secure document access and collaboration solutions, today announced that its users can now securely view and make annotations to documents directly on …

Advanced malware protection with Sourcefire FireAMP

Sourcefire introduced FireAMP advanced malware protection, a malware discovery and analysis solution that analyzes and blocks malware by utilizing big data analytics. Designed …

Tax-themed spam delivers malware

The US Internal Revenue Service kicked off the 2012 tax filing season on January 4, and malware peddlers haven’t waited much to begin targeting users with tax-themed …

DreamHost hacker accessed pool of unencrypted passwords

DreamHost, one of the world’s most popular and well-known web hosting providers, has sent a warning out to its customers saying that one of their databases containing …

Tool used in Anonymous Megaupload campaign

Once again, Anonymous is using the low orbit ion canon (LOIC) to DDoS websites. This tool was developed by white hat hackers to stress test websites. Not surprisingly, the …

New Infrastructure as a Service federation platform

6fusion released its next generation UC6 Infrastructure as a Service (IaaS) federation platform. The new version features a completely redesigned web user interface, along …

Low Tech Hacking

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that …

Data Privacy Day 2012 is upon us

Coordinated and led by the National Cyber Security Alliance (NCSA), Data Privacy Day on January 28, 2012 will promote the importance of data privacy and encourage digital …

Don't miss

Cybersecurity news