Please turn on your JavaScript for this page to function normally.
Cloud-based rapid disaster recovery

Unitrends unveiled its Vault2Cloud disaster recovery service, monitored and managed through a simple, easy-to-use Web 2.0-based user interface. Vault2Cloud solves many of the …

Video: Nessus scan through a meterpreter session

Run a Nessus scan through a compromised host:

New release of RSA Data Loss Prevention Suite

With more than 70 new features for scanning, workflow, reporting, and global content processing, version 8.0 of the RSA Data Loss Prevention (DLP) Suite is engineered to allow …

Virtual PC Hypervisor vulnerability remains unpatched

Core Security issued an advisory disclosing a vulnerability that could affect large numbers of organizations and consumers using Microsoft’s Virtual PC virtualization …

Chrome unique IDs removed after first update

Google decided to appease privacy advocates by making the “unique ID” feature “disappear” when the Chrome browser checks for updates for the first time …

Facebook removes “stalker” apps

A short-lived resurgence of “stalker” applications was promptly squashed by Facebook a few days ago when many users received notifications or wall posts from their …

Mac OS X ransomware – just a matter of time?

For years now, IT experts have been predicting the advent of threats to Mac users that would mirror those faced by the Windows-using crowd. While Mac malware does exist, and …

FBI: Online fraud loss was $559 million in 2009

Online crime complaints increased substantially once again last year, according to a report about fraudulent activity on the Internet from the Internet Crime Complaint Center …

Intel launches its most secure data center processor

Combining security, performance and energy efficiency, Intel launched the Intel Xeon Processor 5600 series which deliver two new security features — Intel Advanced …

Six common virtualization security risks and how to combat them

Through 2012, 60 percent of virtualized servers will be less secure than the physical servers they replace, according to Gartner. Although they expect this figure to fall to …

Implement the SSH-2 protocol in pure Java

Ganymed SSH-2 for Java is a library which implements the SSH-2 protocol in pure Java (tested on J2SE 1.4.2 and 5.0). It allows one to connect to SSH servers from within Java …

Blazing fast password recovery with new ATI cards

ElcomSoft accelerates the recovery of Wi-Fi passwords and password-protected iPhone and iPod backups by using ATI video cards. The support of ATI Radeon 5000 series video …

Don't miss

Cybersecurity news