Please turn on your JavaScript for this page to function normally.
GPS child tracking device from Amber Alert

Amber Alert GPS today launched the Amber Alert GPS 2G, a child tracking device enabling parents to always know where their children are. Amber Alert GPS 2G gives parents the …

Video: Web application scanning with Nessus

Scanning web applications with Nessus offers the end user several new configuration options in the Nessus client. You should take into account: Number of web servers and …

Defunct company forbidden to sell customer’s biometric data

Wired reports that Clear, one of the 7 companies that have been approved by the Transportation Security Administration and that provided the service of helping passengers get …

Video: Tor and nmap with tortunnel

In the video below we look at how you can preform a port scan through a tor network by jumping to the exit node with Moxie’s excellent tortunnel tool. We also look at …

New variant of the OSX_JAHLAV malware in the wild

Trend Micro researcher Ivan Macalintal, discovered another variant of the JAHLAV family: OSX_JAHLAV.I affecting Mac OS X. Once again, this malware comes in the form of a …

Military server compromised

The Boston Globe reports that a random online search for software revealed a serious security breach into the servers of the Reserve Officers’ Training Corps (ROTC) at …

A rising threat: Real-time keyloggers

According to Saul Hansell, a NY Times blogger, attackers have improved keylogging software by making it able to report your login credentials in real time via a Twitter-like …

It’s official: Mac OS X 10.6 Snow Leopard available on August 28th

Apple today included a pre-order of Mac OS X 10.6 Snow Leopard on the Apple Store and Amazon.com has it in stock as well. To the delight of Mac users, this proves that the …

The crime organizations behind most cyber criminal activity

Money makes the world go around. Those who don’t have it, want it, and those who have it – want more of it. Organized crimes operations are know for their …

New book: “Programming the Semantic Web”

The promise of the semantic web – in which machines can find, share, and combine data on the Web – is not just a technical possibility, but a practical reality. …

Adobe releases Flex SDK security update

An important vulnerability has been identified within template files contained in the Flex 3.3 SDK and earlier versions. This vulnerability could allow an attacker to execute …

Apple Remote Desktop 3.3 released

Apple Remote Desktop allows you to manage the Mac computers on your network. Distribute software, provide real-time online help to end users, create detailed software and …

Don't miss

Cybersecurity news