Please turn on your JavaScript for this page to function normally.
New security products for the Mac

McAfee has extended its protection to Mac consumers with the launch of McAfee Internet Security and McAfee Family Protection for Mac. McAfee Internet Security empowers …

Siemens SCADA systems under attack by information stealing worm

The recently discovered Stuxnet worm that contains the password for Siemens’ SCADA systems is wreaking havoc around the world. The Simatic WinCC SCADA system, which runs …

Lack of computer security experts weighs heavy on U.S. cyber defense

It is old news that the U.S. lack the manpower needed when it comes to defending its own information infrastructure. Again and again, existing security experts that work for …

Botnet C&C centers move to social networks

In the last year or so, we have witnessed many botnet command and control centers being taken down in organized actions instigated or aided by companies such as Microsoft, …

TrueCrypt 7.0 released

TrueCrypt 7.0 has been released. Among the new features are hardware-accelerated AES, support for devices that use sector sizes other than 512 bytes, ability to configure a …

New zero-day “shortcut worm” vulnerability affects all Windows versions

Microsoft published Security Advisory 2286198 on Friday of last week, confirming the existence of a critical vulnerability in all supported versions of Windows. The new …

iTunes 9.2.1 fixes critical hole

iTunes 9.2.1 comes with improvements and a security fix. A buffer overflow exists in the handling of “itpc:” URLs. Accessing a maliciously crafted …

A holistic approach to managing risk

McAfee unveiled a risk management solution for IT security that combines real-time threat intelligence with global vulnerability scanning across applications, databases and …

Fully itegrated e-mail and web cloud security service

Zscaler announced the worldwide availability of a fully integrated e-mail and web security service. Key features include: Accurate filtering to block spam and phishing Deep …

SOURCE Barcelona 2010 speaker line-up

SOURCE Conference brings computer and IT security professionals and practitioners together in a unique environment to discuss the security industry’s most important …

Splunk 4.1.1 brings 90+ fixes

Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …

Identifying suspicious URLs

This video explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated …

Don't miss

Cybersecurity news