Please turn on your JavaScript for this page to function normally.
Portable multi-boot security suite Katana 1.0 beta released

Katana is a portable multi-boot security suite which brings together all of the best security distributions to run from one USB drive. Katana includes distributions which …

University server breached, 163,000 social security numbers exposed

Personal information of 163,000 women has been compromised during a breach that targeted a server of the University of North Carolina’s School of Medicine. The server in …

McAfee and Adobe form security alliance

McAfee and Adobe announced a global alliance partnership to deliver new comprehensive security solutions to both companies’ customers. They will deliver an integrated …

Should the U.S. government control the Internet?

Following the recent introduction in the Senate of bills that (if passed) would allow the U.S. president to shut down the Internet in case of a cyber emergency, a lot of …

Software-based threat detection solution

Guidance Software announced EnCase Cybersecurity, designed for information security, network defense and incident response teams who are tasked with protecting sensitive or …

Obama appoints copyright czar

According to Wired, President Obama appointed on Friday the first “copyright czar” in U.S. history. Her name is Victoria Espinel, and the official job title is …

Video: OWASP top 10 security vulnerabilities

Below you can watch two videos with a talk on OWASP top 10 security vulnerabilities, given by Barry Dorrans at the UK Vista Squad user group meeting in London. Update …

Businesses risk data loss as backup is overlooked

Small and medium enterprises (SMEs) are putting data at risk according to recent research by Buffalo Technology. Worrying results indicate that data backup is being ignored …

New book: “Programming Cocoa with Ruby”

Programming Cocoa with Ruby brings together two enthusiastic development communities. Ruby programmers will tell you how productive they are with just the right amount of …

Video: Anti-malware testing

Rik Ferguson from Trend Micro talks about a new third party anti-malware testing methodology that better reflects today’s real-world conditions.

Process Hacker 1.5 released

Process Hacker is a free and open source process viewer and memory editor with unique features such as powerful process termination and a Regex memory searcher. It can show …

Ants vs. worms: Computer security mimics nature

In the never-ending battle to protect computer networks from intruders, security experts are deploying a new defense modeled after one of nature’s hardiest creatures …

Don't miss

Cybersecurity news