Please turn on your JavaScript for this page to function normally.
Assange denied bail, WikiLeaks issues next batch of cables

Following his arrest yesterday, Julian Assange has been taken to hearing at City of Westminster magistrates court, where details of the charges laid against him have been …

Increased collaboration on cybercrime syndicate crackdowns

As 2010 comes to a close, information security companies are trying to predict the amount of problems we’ll have to deal with next year. Below is a list of 5 security …

Avoid the phishing net

Phishing, the process of attempting to acquire sensitive information by masquerading as a legitimate and trustworthy company via online means, used to just be a problem for …

CORE IMPACT Pro 11 now detects and exploits network router vulnerabilities

Core Security Technologies introduced the latest version of its automated penetration testing solution, CORE IMPACT Pro 11. CORE IMPACT Pro enables users to conduct real-world …

Growing mobile workforce will increase security complexity

IT security administrators anticipate a significant increase in the number of users connecting to their network in the next year, with 54% citing specific growth in the number …

Vulnerability scanning added to GFI MAX RemoteManagement

GFI Software added vulnerability scanning and security patch management to GFI MAX RemoteManagement, an IT managed services software solution that makes it easy to stay on top …

Twitter worm spreading malicious goo.gl links?

A new Twitter worm seems to be burrowing its way across the service, apparently forcing mobile Twitter users to retweet a goo.gl shortened link which they clicked on …

Cisco estimates huge shift to the cloud by 2013

Nearly 12 percent of enterprise workloads will run in the public cloud by the end of 2013, according to Cisco. Their study found that desktop applications, email, …

What’s in store for 2011? More scams and identity theft

Unemployment, economic uncertainty and the proliferation of technology will be factors in emerging types of fraud over the next year, according to the 2011 Identity Theft …

Security Factsheets: A new look at vulnerability data

Secunia today announced their Security Factsheets, designed for those who are interested in understanding the historical development of advisories and vulnerabilities in …

Search results for Mono Lake lead to malware

The recent discovery by NASA scientists of a bacteria that uses arsenic in its cellular structure has prompted a lot of people to search the Web for information about it and …

Minimizing virtualization risks

With its potential to reduce expenses, drive automation and provide flexibility, virtualization has earned its way onto the board agenda and is being implemented by …

Don't miss

Cybersecurity news