Enhance applications with digital signing and encryption functions
EldoS released a new version of SecureBlackbox. New offerings such as secure operations with cloud storages and office document security will help developers create software …
Webroot adds vulnerability scanning to cloud-based web security service
Webroot introduced a vulnerability scanner delivered in the cloud as part of a Web security software-as-a-service (SaaS) model. The new service offers weekly and monthly tests …
Rogue software details: A-fast Antivirus
A-fast Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
Sophos sells majority stake to equity group
Sophos has reached a definitive agreement to sell a majority interest in the company to equity group Apax Partners, in a transaction valuing the company at $830 million (USD). …
New book: “Windows 7: The Missing Manual”
Windows 7 comes without a single page of printed instructions. Fortunately, David Pogue is back, ready to serve as your clear, funny, expert guide with Windows 7: The Missing …
Latest scams and how to avoid them
Over the years, we have come to rely on the Internet to fulfill many of our needs – the need to keep in touch with our friends and colleagues, the need to save time and …
Forged checks pass flawed examination process
The recent cases of two Texan women who had their personal information and checking account numbers stolen and used to validate bogus checks, have brought into the spotlight a …
Trojan disguised as a toolbar for Facebook
A Facebook toolbar is just what you need to make your sharing and connecting with friends easier, says in an email supposedly coming from “Facebook.com”: If you …
IT security priorities of future EU research
The European Network and Information Security Agency (ENISA) launched a new report concluding that the EU should focus its future IT security research on five areas. This …
Hyper-V Best Practices Analyzer for Windows Server 2008 R2 now available
In Windows management, best practices are guidelines to configure a server as defined by experts. For example, it is considered a best practice for most server technologies to …
Fake Amazon “Deal of the Day” emails doing rounds
Fake Amazon newsletters have lately become regular visitors in inboxes around the world, says Trend Micro. With “Amazon.com Deal of the Day” in the subject line, …
OpenDLP: Data loss prevention tool
OpenDLP is a free and open source, agent-based, centrally-managed, massively distributable data loss prevention tool. Given appropriate Windows domain credentials, OpenDLP can …
Featured news
Sponsored
Don't miss
- Tech stack uniformity has become a systemic vulnerability
- How human-led threat hunting complements automation in detecting cyber threats
- 33 open-source cybersecurity solutions you didn’t know you needed
- Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711)
- AI cybersecurity needs to be as multi-layered as the system it’s protecting