Please turn on your JavaScript for this page to function normally.
FTC shuts down Cutwail botnet but it makes a comeback

The Cutwail botnet, one of the most notorious botnets accounting for up to 35 percent of all spam in May 2009 across the globe, experienced a major blow to its track record …

Apple releases AirPort Utility 5.4.2

AirPort Utility 5.4.2 (DMG download) is the simple to use, setup and management utility for the AirPort Express Base Station, the AirPort Extreme Base Station, and Time …

British communist party website infected by malware

Researchers at Sophos have discovered that the website of the British Communist Party has had malware planted on it by attackers, designed to infect the computers of potential …

MIS Training Institute’s annual information security survey

The MIS Training Institute’s annual information security survey was designed to identify the latest challenges, priorities, investment and management decisions faced by …

(ISC)2 urges focus on workforce development in implementing Obama’s cybersecurity plan

(ISC)2 announced its support of the recommendations to advance the federal cybersecurity workforce as outlined in the report titled, “Cyberspace Policy Review,” …

Little Snitch 2.1.4 released

Little Snitch informs you whenever a program attempts to establish an outgoing Internet connection. You can then choose to allow or deny this connection, or define a rule how …

73% of companies believe they are vulnerable to hacking

Seventy three percent of IT professionals admit their software applications are still vulnerable to hackers, only an eight percent reduction on last year’s startling …

Public beta of HouseCall 7.0 is now available

HouseCall 7.0 is a major redesign of Trend Micro’s free online virus and malware scanning service. Since its introduction in 1997, HouseCall has been scanning computers, …

Home security apps for iPhone and BlackBerry

Alarm.com launched two new native apps for iPhone and BlackBerry. Alarm.com’s new iPhone app, which runs on both iPhone and iPod touch, has been approved by Apple and is …

Your next data breach: It’s not if, it’s when

We have all seen pictures of documents stamped “Top Secret” and “Eyes Only”. We’ve seen couriers carrying documents in briefcases handcuffed to …

Enterprise risk management study

CS STARS has completed an Enterprise Risk Management (ERM) Study to gauge ERM activity. The study, done via an on-site survey of CS STARS clients, evaluates stages of progress …

10 tips to keep IT security costs down in the recession

1. Move to UTMs (unified threat management systems) UTMS save money over multiple point solutions. They can cost just a quarter of the price of multiple solutions. With UTMs …

Don't miss

Cybersecurity news