Free P2P security guide
A new guide from Network Box advises companies to prevent employees from accessing P2P networks or technology on computers used for work, and gives free advice on how to …
Developer contest for Windows 7 biometric applications
UPEK and Microsoft launched the Worldwide Biometric Challenge, a developer contest for biometric applications on Windows 7, the first Windows operating system with native …
Apple update fixes BIND vulnerability
Apple released Security Update 2009-004 which can be downloaded and installed via Software Update preferences, or from Apple downloads. A logic issue in the handling of …
Security industry expert to oversee RSA Conference content
Today, RSA Conference announced the appointment of Dr. Hugh Thompson, CISSP, as Program Committee Chair and Advisory Board Member. In this newly defined Program Committee …
iPhone IP surveillance software
videoNEXT announced its mobile video apps in the Apple App Store for iPhone and iPod touch. videoNEXT’s new CAVU, CAVU FREE and CAVU PRO provide users with remote video …
New version of hybrid IPSec/SSL VPN gateway from NCP
NCP engineering announced a new version of the software-based NCP Secure Enterprise Server for Windows. A hybrid IPSec and SSL gateway, the solution controls and monitors all …
52 percent of new viruses only last 24 hours
Every day, PandaLabs receives nearly 37,000 samples of new viruses, worms, Trojans and other types of Internet threats, 52 percent of which (that is 19,240 on average) spread …
Why are criminals targeting Facebook and other social networking sites?
The hugely popular social networking sites like Facebook and Twitter have become attractive targets for phishing and scamming attacks as online criminals follow the latest …
WordPress 2.8.4 fixes annoying vulnerability
Recently, a vulnerability was discovered: a specially crafted URL could be requested that would allow an attacker to bypass a security check to verify a user requested a …
69% of Australian organizations hit by a data breach within the last 12 months
The 2009 Annual Study: Australian Enterprise Encryption Trends by The Ponemon Institute, which polled IT security professionals at 482 enterprises, found that 69% of …
New book: “The Myths of Security”
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly …
New Cisco CCNA Security course
Security and risk-management skills are among the most sought-after skills in networking, and global demand continues to grow. Organizations around the world are experiencing …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption