>>> BLACK FRIDAY 2025 cybersecurity deals to explore <<<

Please turn on your JavaScript for this page to function normally.
TrueCrypt 7.0 released

TrueCrypt 7.0 has been released. Among the new features are hardware-accelerated AES, support for devices that use sector sizes other than 512 bytes, ability to configure a …

New zero-day “shortcut worm” vulnerability affects all Windows versions

Microsoft published Security Advisory 2286198 on Friday of last week, confirming the existence of a critical vulnerability in all supported versions of Windows. The new …

iTunes 9.2.1 fixes critical hole

iTunes 9.2.1 comes with improvements and a security fix. A buffer overflow exists in the handling of “itpc:” URLs. Accessing a maliciously crafted …

A holistic approach to managing risk

McAfee unveiled a risk management solution for IT security that combines real-time threat intelligence with global vulnerability scanning across applications, databases and …

Fully itegrated e-mail and web cloud security service

Zscaler announced the worldwide availability of a fully integrated e-mail and web security service. Key features include: Accurate filtering to block spam and phishing Deep …

SOURCE Barcelona 2010 speaker line-up

SOURCE Conference brings computer and IT security professionals and practitioners together in a unique environment to discuss the security industry’s most important …

Splunk 4.1.1 brings 90+ fixes

Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …

Identifying suspicious URLs

This video explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated …

Hacker fingerprints – the future of malware detection?

It has been obvious for a time now that security companies will have to find a new malware detection technique that will complement their heuristic engines searching for …

Skimming devices on gas pumps sending stolen card numbers via Bluetooth

A maintenance worker at a Shell gas station located in Florida was the first one to notice that a gas pump he was checking had been fitted with a credit card skimming device. …

Emerging threats in the end user environment

New social networking technologies, mobile devices and a more flexible and tech-savvy workforce are leading to increasingly complex and diverse end user environments with many …

Open source IDS Suricata 1.0 released

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Suricata is the result of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools