Please turn on your JavaScript for this page to function normally.
Can a router hack expose your physical location?

Remember the Samy worm? The author of the first major worm that took advantage of cross-site scripting to propagate itself all across MySpace has found and exploited another …

A closer look at CA Internet Security Suite Plus 2010

CA ISS Plus 2010 provides protection against viruses, spyware, hackers, spam, phishing and offensive websites (with Parental Controls). There is also a backup option …

Netgear releases 3G/4G/WiMAX wireless routers

Netgear announced two full-featured new routers for connecting to 3G/4G/WiMAX cellular networks. The 3G/4G Mobile Broadband Wireless-N Router (MBRN3000) combines 802.11n …

Cybersecurity expert: Job guaranteed

Computer security used to be regarded as a boring and less important field of computer science, but with the proliferation of computer threats (from malware to active attacks) …

New books: The Sustainable Network, iPhone SDK Development, VMware Cookbook

What technologies do we need to solve the complex environmental, economic, social, and political challenges facing us today? This book by Sarah Sorenson reveals that one tool …

A closer look at Symantec Security Check

Symantec Security Check is a web-based scan that combines two features: a Security Scan and Virus Detection. To use it, you will be asked to download some components and …

Cyber-liability: Importance and complexity

When the U.S. Supreme Court agreed to take the case of a California police officer who sent sexually explicit text messages on a department-issued pager, news reports …

Mac video surveillance

SecuritySpy is a multi-camera video surveillance application for the Mac. It will enable you to set up a comprehensive surveillance system quickly. The motion detection …

Rogue software details: XPPoliceAntivirus

XPPoliceAntivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\XP …

Modification risks from portable devices

Software crackers are likely to continue modifying relatively low-cost specific-application devices, such as e-readers, but that the potential security risks to companies are …

Splunk 4.0.8 released

Splunk released version 4.0.8 of the Splunk IT search and analysis engine. General issues When you save a top or rare search with the argument showperc, the showperc argument …

The Pentagon waiting for its computer networks defense command

The Pentagon had planned to launch a cyber command that would be responsible for defending its global network of computer systems on October 1, following it by the appointment …

Don't miss

Cybersecurity news