TrueCrypt 7.0 released
TrueCrypt 7.0 has been released. Among the new features are hardware-accelerated AES, support for devices that use sector sizes other than 512 bytes, ability to configure a …
New zero-day “shortcut worm” vulnerability affects all Windows versions
Microsoft published Security Advisory 2286198 on Friday of last week, confirming the existence of a critical vulnerability in all supported versions of Windows. The new …
iTunes 9.2.1 fixes critical hole
iTunes 9.2.1 comes with improvements and a security fix. A buffer overflow exists in the handling of “itpc:” URLs. Accessing a maliciously crafted …
A holistic approach to managing risk
McAfee unveiled a risk management solution for IT security that combines real-time threat intelligence with global vulnerability scanning across applications, databases and …
Fully itegrated e-mail and web cloud security service
Zscaler announced the worldwide availability of a fully integrated e-mail and web security service. Key features include: Accurate filtering to block spam and phishing Deep …
SOURCE Barcelona 2010 speaker line-up
SOURCE Conference brings computer and IT security professionals and practitioners together in a unique environment to discuss the security industry’s most important …
Splunk 4.1.1 brings 90+ fixes
Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …
Identifying suspicious URLs
This video explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated …
Hacker fingerprints – the future of malware detection?
It has been obvious for a time now that security companies will have to find a new malware detection technique that will complement their heuristic engines searching for …
Skimming devices on gas pumps sending stolen card numbers via Bluetooth
A maintenance worker at a Shell gas station located in Florida was the first one to notice that a gas pump he was checking had been fitted with a credit card skimming device. …
Emerging threats in the end user environment
New social networking technologies, mobile devices and a more flexible and tech-savvy workforce are leading to increasingly complex and diverse end user environments with many …
Open source IDS Suricata 1.0 released
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Suricata is the result of …
Featured news
Resources
Don't miss
- Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)
- How a noisy ransomware intrusion exposed a long-term espionage foothold
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory
- Cryptomixer crypto laundering service taken down by law enforcement