Please turn on your JavaScript for this page to function normally.
Enhance applications with digital signing and encryption functions

EldoS released a new version of SecureBlackbox. New offerings such as secure operations with cloud storages and office document security will help developers create software …

Webroot adds vulnerability scanning to cloud-based web security service

Webroot introduced a vulnerability scanner delivered in the cloud as part of a Web security software-as-a-service (SaaS) model. The new service offers weekly and monthly tests …

Rogue software details: A-fast Antivirus

A-fast Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Sophos sells majority stake to equity group

Sophos has reached a definitive agreement to sell a majority interest in the company to equity group Apax Partners, in a transaction valuing the company at $830 million (USD). …

New book: “Windows 7: The Missing Manual”

Windows 7 comes without a single page of printed instructions. Fortunately, David Pogue is back, ready to serve as your clear, funny, expert guide with Windows 7: The Missing …

Latest scams and how to avoid them

Over the years, we have come to rely on the Internet to fulfill many of our needs – the need to keep in touch with our friends and colleagues, the need to save time and …

Forged checks pass flawed examination process

The recent cases of two Texan women who had their personal information and checking account numbers stolen and used to validate bogus checks, have brought into the spotlight a …

Trojan disguised as a toolbar for Facebook

A Facebook toolbar is just what you need to make your sharing and connecting with friends easier, says in an email supposedly coming from “Facebook.com”: If you …

IT security priorities of future EU research

The European Network and Information Security Agency (ENISA) launched a new report concluding that the EU should focus its future IT security research on five areas. This …

Hyper-V Best Practices Analyzer for Windows Server 2008 R2 now available

In Windows management, best practices are guidelines to configure a server as defined by experts. For example, it is considered a best practice for most server technologies to …

Fake Amazon “Deal of the Day” emails doing rounds

Fake Amazon newsletters have lately become regular visitors in inboxes around the world, says Trend Micro. With “Amazon.com Deal of the Day” in the subject line, …

OpenDLP: Data loss prevention tool

OpenDLP is a free and open source, agent-based, centrally-managed, massively distributable data loss prevention tool. Given appropriate Windows domain credentials, OpenDLP can …

Don't miss

Cybersecurity news