Please turn on your JavaScript for this page to function normally.
Is phone phishing making a comeback?

By now, pretty much everyone knows that when one receives an email purportedly coming from a bank or a financial institution, extreme caution and distrust is in order. We have …

70 Romanian cyber crooks arrested

70 people belonging to 3 unconnected cybercrime gangs were arrested yesterday during raids performed by the Romanian police. The gangs m.o. was apparently as follows: they …

Security benchmarks for Windows 7 and Windows Server 2008

The Center for Internet Security (CIS) released its consensus security benchmarks for Windows 7 and Windows Server 2008. The free benchmarks provide prescriptive controls …

Secure communication with RetroShare

RetroShare is an open source cross-platform, private and secure decentralized communication platform. It allows you to securely chat and share files with your friends and …

Facebook will not start charging users

“News” of Facebook’s plan to charge for the use of its network is once again surfacing and being propagated by users and Facebook groups set up (as it seems) …

(IN)SECURE Magazine issue 25 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 25 has been released today. Table of contents The …

First iPad cloud server application

Rackspace Cloud Pro is a free application for the iPad to enable users can turn on backups for a server, create new servers from backups, manage back-up scheduling, re-boot, …

U.S. infrastructure at risk from sophisticated cyber attacks

Nearly three-quarters of federal IT decision-makers who work in national defense and security departments or agencies say the possibility is “high” for a cyber …

Drobo FS: Data storage and protection

Data Robotics introduced Drobo FS which is designed for simple, expandable file sharing. By providing network file sharing capabilities along with automated data protection, …

Generic and behavior-based threats increasing

Sunbelt Software announced the top 10 most prevalent malware threats for the month of March 2010. The list shows the continued prevalence of Trojan horse programs circulating …

Check how secure, private and open an app is

Surfing through the Net in search of a objective review of an application can be a daunting task, and even when you find one, it usually barely touches the issues of security …

iPad, iPhone “prizes” as lures for Twitter users

Not surprisingly, spam using the Apple iPad as a lure to get users to give up personal or credit card information has began to make rounds of Twitter users. Sunbelt reveals …

Don't miss

Cybersecurity news