Top security predictions for 2012
As December rolls in and 2012 looms on the IT security horizon, Tufin Technologies – the security lifecycle management specialist – has come up with its top five …
Tips to stay protected online
Now more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus software is a key step in defending against …
Download.com “cleans up” Nmap but not other downloads
When he discovered that Nmap was being distributed by C|Net’s Download.com site bundled up with a proprietary trojan installer that installed a sketchy toolbar, changed …
OpenDNS tool secures DNS traffic
OpenDNS unveiled a preview of DNSCrypt, a new technology that improves both the security and privacy of Internet users, particularly those on unsecured wireless hotspots and …
Spam run frightens with fake news about epidemic
The time has come again for users to be targeted with spam emails alerting them to an epidemic raging in some part of the world: The subject line contains a simple …
Inside the latest issue of (IN)SECURE Magazine
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. The December 2011 issue features: 7 questions you always …
Germany leads Europe for USB drive data security
Many organizations are ignoring the risk of unencrypted USB drives and are not following through with appropriate USB security policies. The Ponemon Institute research also …
Surge in pre-Christmas malware
GFI Software released its report on the most prevalent threat detections for the previous month. Noteworthy threats in November 2011 included a new Facebook worm; the return …
Free tool exploits SQL injection vulnerabilities
NT OBJECTives announced NTO SQL Invader, a free tool which provides pen testers and developers the ability to quickly and easily exploit and demonstrate SQL Injection …
Tips for securing Internet connected devices
From the hottest new tablet to sleek smartphones and laptops, electronic devices are likely at the top of many consumers’ holiday wish lists this year. Many lucky …
Free data loss prevention tool for enterprise IT
STEALTHbits released of DLP Lite for File Systems, a free, regex DLP tool that aids organizations in identifying high-risk, unsecured content on their networks to mitigate the …
Secure remote access from SonicWALL
The proliferation of powerful smartphones and tablets poses a new problem for IT: providing secure remote access to network resources for a growing number of employees who use …
Featured news
Resources
Don't miss
- Commix: Open-source OS command injection exploitation tool
- Review: The Chief AI Officer’s Handbook
- How QR code attacks work and how to protect yourself
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects