Please turn on your JavaScript for this page to function normally.
Ubuntu 10.04 released

Ubuntu 10.04 LTS includes three years of support through free security and maintenance updates. It features extensive design work, faster boot speed, social network …

Cisco Press books in the App Store

Cisco Press launched its first iPhone/iPad networking technology Apps, for IT professionals interested in general networking, networking security, or IP Video. The new Apps …

Secure document viewing

VASCO Data Security announced a solution for secure document viewing. By integrating VASCO authentication technology with LiveCycle Rights Management ES2, enterprises can now …

Red Condor 7.1 targets scams, phishing and image-based spam

Red Condor released version 7.1 of its anti-spam software which contains content filtering enhancements, a new grey listing feature, auditing controls, and enhanced …

Symantec acquires PGP

Symantec has signed definitive agreements to acquire PGP and GuardianEdge. Symantec will buy PGP for a purchase price of approximately $300 million in cash and GuardianEdge …

European privacy concerns regarding U.S. policies

There are a lot of people in Europe who feel that governments and companies should not be able to collect information of individuals so they can use it in ways that violate …

Fake Twitter email continues to plague inboxes, leads to malware

Almost a week ago, Twitter began warning its users about fake Twitter Support emails. Since then, a couple of variants of the email have surfaced, with small differences in …

The Storm botnet strikes again

Once upon a time, the Storm botnet was responsible sending out 20 percent of all spam, but was eventually crippled by the rise of new malicious software removal tools. By the …

India now the primary producer of viruses

India has pushed Korea into second place and taken over the mantle of the world’s largest producer of internet viruses, according to analysis of internet threats in …

The staggering cost of a data breach

The average cost of a data breach globally stood at USD 3.43 million last year, the equivalent of USD 142 per compromised customer record, according to research from the …

Rogue software details: Digital Protection

Digital Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Introduction to malware analysis

In this video, Lenny Zeltser will introduce you to the process of reverse-engineering malicious software. He will outline behavioral and code analysis phases, to make this …

Don't miss

Cybersecurity news