New book: “Regular Expressions Cookbook”
Every programmer can find uses for regular expressions, but their power doesn’t come worry-free. Even seasoned users often suffer from poor performance, false positives, …
WordPress 2.8.1 released
WordPress 2.8.1 fixes many bugs and tightens security for plugin administration pages. Core Security found that admin pages added by certain plugins could be viewed by …
Sober worm returns and uses social engineering techniques
PandaLabs has recorded the appearance of a new variant of the Sober worm, Sober.Y, which spreads using social engineering techniques in emails sent in English or German. The …
Security management application for the Mac
Bradford Networks has expanded its Campus Manager Security Management Application to include the Macintosh platform. The Security Management Application is an Endpoint …
Bunkermail: Secure, encrypted file transfer
GlobalCrypto released Bunkermail for highly-secure file transfer. A web-based email service, this no overhead encryption solution makes adoption easy for both IT and capital …
Spyware encounters are increasing at work
Trend Micro announced key findings from a study that reveals that more than 87 percent of corporate end users are aware of spyware, and yet 53 percent of survey respondents …
RSA Conference 2010 call for speakers
RSA Conference made available the offline call for speakers submission form for RSA Conference 2010, taking place March 1 – 5, 2010, at the Moscone Center in San …
58% of SMBs worldwide affected by malware
Panda Security has drawn up a worldwide barometer of security status in SMBs1. According to this study, 58% of SMBs worldwide are affected by malware. Brazil, at 86%, is the …
IBM develops shield to mask sensitive on-screen information
IBM Research has developed software that more efficiently and effectively hides sensitive or personal information that might otherwise appear on the computer screens of …
VPN management for Linux networks
NCP engineering released a new version of the software-based NCP Secure Enterprise Management (SEM) System for Linux-based systems. Developed from the ground up to make hybrid …
Guide to common hoaxes, hacks and Internet horrors
As Internet scams increase in sophistication, Network Box advises users to be more alert, with the publication of a guide to common hoaxes, hacks and Internet horrors. The …
Safari 4.0.2 fixes security issues
Apple released Safari 4.0.2 that contains two security fixes. Issues affect Mac OS X, Windows XP and Vista. Visiting a maliciously crafted website may lead to a cross-site …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption