Please turn on your JavaScript for this page to function normally.
Enterprise security testing and measurement

Core Security Technologies introduced Core Insight Enterprise, which allows IT security executives to gain greater visibility into their organizations’ enterprise-wide …

Twitter to establish information security program

Social networking service Twitter has agreed to settle Federal Trade Commission charges that it deceived consumers and put their privacy at risk by failing to safeguard their …

Man indicted for hacking and threatening the Vice President

A 45-year-old Blaine, Minnesota man has been indicted in federal court in the District of Minnesota for hacking into his neighbor’s wireless Internet system and …

.org becomes first generic TLD protected by DNSSEC

Knowing full well that DNSSEC won’t be the silver bullet that will solve the massive problem that is cyber security, but will at least provide protection against …

Wireshark in the large enterprise

Hansang Bae leads the Network/Application Performance Engineering Team with direct responsibility for Packet Capture Infrastructure at Citi. In the very in-depth video below, …

Phishing requires more effort than you might think

When it comes to setting up phishing pages, there are some phishers that make the extra effort. Take those behind the fake Orkut login pages, for example. Symantec has been …

IT pros expect network threats to increase as budgets decline

Of the 100-plus netForensics survey respondents, 85% believe their organization’s security environment will grow more complex over the next 24 months, leading to …

How consumers influence data loss and breaches

Cisco announced the results of a survey exploring the security implications of social networking and the use of personal devices in the enterprise. One of the most striking …

Rogue software details: Sysinternals Antivirus

Sysinternals Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

New book: Network Flow Analysis

Network flow analysis is the art of studying high volume network traffic. Rather than capture every single packet, flow analysis allows network administrators to selectively …

WhiteHat Sentinel: SaaS website vulnerability management

WhiteHat Security updated WhiteHat Sentinel, its software-as-a-service (SaaS) website vulnerability management offering, including new User and Role Management options, …

Social networking “Bill of Rights” released

A little over a month ago, the Electronic Frontier Foundation offered their suggestions about what a social networking “bill of rights” should contain. Last week …

Don't miss

Cybersecurity news