Please turn on your JavaScript for this page to function normally.
Cloud-based email archiving with policy-based encryption

LiveOffice announced the availability of policy-based encryption, which provides organizations with end-to-end protection for all messages and attachments while in transit. …

Web application security statistics for 2008

The Web Application Security Consortium (WASC) announced the WASC Web Application Security Statistics Project 2008, a collaborative industry wide effort to pool together …

New book: “Programming the iPhone User Experience”

Apple’s iPhone and iPod Touch not only feature the world’s most powerful mobile operating system, they also usher in a new standard of human-computer interaction …

Schwarzenegger vetoes update to breach disclosure law

In a move that surprised everyone (but mostly Senator Joe Simitian, the author of the final version), Governor Schwarzenegger put a veto on a bill meant to update the famous …

OpenBSD 4.6 released

OpenBSD 4.6 is here. To get the files for this release either order a CDROM or check out one of the FTP page for a list of mirrors. Some of the new features are: New/extended …

Open source Web server scanner Nikto 2.1.0 released

Nikto is an open source Web server scanner which performs comprehensive tests against web servers for multiple items, including over 3500 potentially dangerous files/CGIs, …

Cain & Abel 4.9.34 released

Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …

Net neutrality – is it a good idea?

Following last month’s announcement from the Chairman of the US Federal Communications Commission about his intention to push for official rules that would prevent ISPs …

China clamps down on Tor

It is a well known fact that the Chinese government is a big fan of Internet censorship. The “Great Firewall of China” (a system that blocks content by preventing …

New book on insider bank fraud

Insidious – How Trusted Employees Steal Millions and Why It’s So Hard for Banks to Stop Them is a new book that provides insight into a critical problem plaguing …

Video: Social engineering for penetration testers

In recent years, people have become more familiar with the term “social engineering”, the use of deception or impersonation to gain unauthorized access to …

Google Wave security features

Like the overwhelming majority of Google’s “products”, Google Wave (a real-time communication and collaboration tool) seems to be a really handy and …

Don't miss

Cybersecurity news