Portable multi-boot security suite Katana 1.0 beta released
Katana is a portable multi-boot security suite which brings together all of the best security distributions to run from one USB drive. Katana includes distributions which …
University server breached, 163,000 social security numbers exposed
Personal information of 163,000 women has been compromised during a breach that targeted a server of the University of North Carolina’s School of Medicine. The server in …
McAfee and Adobe form security alliance
McAfee and Adobe announced a global alliance partnership to deliver new comprehensive security solutions to both companies’ customers. They will deliver an integrated …
Should the U.S. government control the Internet?
Following the recent introduction in the Senate of bills that (if passed) would allow the U.S. president to shut down the Internet in case of a cyber emergency, a lot of …
Software-based threat detection solution
Guidance Software announced EnCase Cybersecurity, designed for information security, network defense and incident response teams who are tasked with protecting sensitive or …
Obama appoints copyright czar
According to Wired, President Obama appointed on Friday the first “copyright czar” in U.S. history. Her name is Victoria Espinel, and the official job title is …
Video: OWASP top 10 security vulnerabilities
Below you can watch two videos with a talk on OWASP top 10 security vulnerabilities, given by Barry Dorrans at the UK Vista Squad user group meeting in London. Update …
Businesses risk data loss as backup is overlooked
Small and medium enterprises (SMEs) are putting data at risk according to recent research by Buffalo Technology. Worrying results indicate that data backup is being ignored …
New book: “Programming Cocoa with Ruby”
Programming Cocoa with Ruby brings together two enthusiastic development communities. Ruby programmers will tell you how productive they are with just the right amount of …
Video: Anti-malware testing
Rik Ferguson from Trend Micro talks about a new third party anti-malware testing methodology that better reflects today’s real-world conditions.
Process Hacker 1.5 released
Process Hacker is a free and open source process viewer and memory editor with unique features such as powerful process termination and a Regex memory searcher. It can show …
Ants vs. worms: Computer security mimics nature
In the never-ending battle to protect computer networks from intruders, security experts are deploying a new defense modeled after one of nature’s hardiest creatures …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage