Disaster preparedness tips for computers
ISACA offers tips to the public and businesses to protect their computers, information and systems during a natural disaster. “Ensuring personal and employee safety is …
PBConnex: Full-disk encryption with pre-boot networking
WinMagic launched SecureDoc with PBConnex, a full-disk encryption solution with pre-boot networking. PBConnex, an extension to SecureDoc, fully integrates network support …
CSA releases Cloud Controls Matrix 1.2
The Cloud Security Alliance (CSA) launched revision 1.2 of the Cloud Controls Matrix (CCM), available for free here. The CCM is designed to provide fundamental security …
Week in review: Digital forensics, new Facebook Privacy Settings and RSA phishing email found
Here’s an overview of some of last week’s most interesting news, articles and videos: Chinese mobile phone monitoring service found What do you think cyber crooks …
Is this the phishing email that caused the RSA breach?
“I forward this file to you for review. Please open and view it,” says simply the email that is thought to have been the means of deploying the backdoor that …
Illegal keygen for well-known AV solution leads to infection
An illegal key generator for the recently released latest version of the TrustPort Internet Security solution brings big trouble to unsuspecting users, warns BitDefender. …
Bitcoin mining botnet also used for DDoS attacks
A recently discovered P2P Bitcoin mining botnet has acquired DDoS capabilities, warns Kaspersky Lab expert Tillmann Werner. It’s main reason of existence has so far been …
Microsoft updates free security tools
Microsoft enhanced three of its free Security Development Lifecycle (SDL) tools – Threat Modeling, MiniFuzz, and RegExFuzz. Threat Modeling Tool 3.1.8 The Threat …
The Basics of Digital Forensics
The Basics of Digital Forensics will provide a foundation for people new to the digital forensics field. This book will teach people how to conduct examinations by discussing …
Cisco Certified Technician: New entry-level certification
Cisco introduced the Cisco Certified Technician (CCT) to its Career Certification Program. The CCT training and certification programs are designed for technicians who perform …
Cyber threat protection for enterprise networks
Damballa released Failsafe 4.2, an advance in detecting criminal command-and-control behavior in corporate networks. Failsafe pinpoints corporate assets under criminal …
CompTIA expands Security Trustmark Program
CompTIA expanded its Security Trustmark program to include two levels of the business accreditation, which identifies companies that follow industry-accepted best security …
Featured news
Resources
Don't miss
- Training an AI agent to attack LLM applications like a real adversary
- You don’t have to choose between BAS or automated pentesting, you shouldn’t
- Why your phishing simulations aren’t building a security culture
- Your security stack looks fine from the dashboard and that’s the problem
- Kali Linux 2026.1 ships BackTrack mode, eight new tools, and a kernel upgrade to 6.18