Firewall Builder 4.0 released
Firewall Builder helps you write and manage configuration for your firewalls. It writes iptables commands, pf.conf file, Cisco router access lists or PIX configuration for …
Deleting yourself from the Web
If there is one positive thing that the recent Facebook privacy changes have brought, it is a raised awareness about the fact that we ourselves are the best guardians of our …
Canadian Pharmacy no longer top spammed brand
According to the statistics by M86 Security Labs, Canadian Pharmacy – the long-standing champion of spammed affiliate brands – made way for the new reigning king: …
Phishers want your Apple gift card
Apple has received a lot of attention lately: the lost iPhone, the Apple vs Adobe bickering about Flash, but it was mostly the release of the iPad and its amazing popularity …
Security risks of web application programming languages
A new WhiteHat report examined the security of specific programming languages. Until now, no other website security study has provided detailed research on how programming …
Facebook security bug lets you eavesdrop on your friends’ chats
On Wednesday morning, a Facebook security flaw allowed users for a few hours to get a glimpse at their friends’ private chats and their their latest pending …
Freeware detects performance loss across the network
Disk Performance Analyzer for Networks 3.0 (DPAN) is a free utility that detects and reports severe fragmentation-related performance loss across the network, all from one …
Facebook Social Plug-ins privacy concerns sorted out by Palo Alto Networks
Facebook users in enterprises are susceptible to having their confidential data shared with third parties because of recent changes at Facebook, which cause behavioral data …
Fake Adobe Security Update malware campaign
Red Condor issued a warning of a new malware threat crafted to appear as an email thread discussing vulnerabilities in Adobe software. The campaign targets Adobe customers and …
Compliance Enforcer 3.0 released
Compliance Enforcer 3.0 leverages nexTier’s DLP algorithms with semantic analysis to provide end-users with auto-classification features, the ability to customize …
Qualys and RSA expand IT-GRC collaboration
Qualys and RSA expanded their technology collaboration to make QualysGuard vulnerability management and IT policy compliance data available to RSA’s client base. The …
Ex-con helps feds foil an ATM hacking scheme
Thor Alexander Morris had a plan. The plan involved reprograming certain ATMs so that they would overpay him when he made a withdrawal, giving out $20 instead of $1 bills …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine