Video: OWASP top 10 security vulnerabilities
Below you can watch two videos with a talk on OWASP top 10 security vulnerabilities, given by Barry Dorrans at the UK Vista Squad user group meeting in London. Update …
Businesses risk data loss as backup is overlooked
Small and medium enterprises (SMEs) are putting data at risk according to recent research by Buffalo Technology. Worrying results indicate that data backup is being ignored …
New book: “Programming Cocoa with Ruby”
Programming Cocoa with Ruby brings together two enthusiastic development communities. Ruby programmers will tell you how productive they are with just the right amount of …
Video: Anti-malware testing
Rik Ferguson from Trend Micro talks about a new third party anti-malware testing methodology that better reflects today’s real-world conditions.
Process Hacker 1.5 released
Process Hacker is a free and open source process viewer and memory editor with unique features such as powerful process termination and a Regex memory searcher. It can show …
Ants vs. worms: Computer security mimics nature
In the never-ending battle to protect computer networks from intruders, security experts are deploying a new defense modeled after one of nature’s hardiest creatures …
Cain & Abel 4.9.32 released
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
Is malware overwhelming the Internet?
It seems that the Universe (or life) must follow a strict set of rules. One of them concerns good things and says: “There’s always a few people who spoil it for …
Futronic launches FS50 two finger scanner
Futronic unveiled the FS50, a portable fingerprint scanner with 1.6 x 1.5 inch (40.64 x 38.10 mm) scanning area. Its advanced optical system can capture 800 x 750 pixels and …
ESET antivirus for Symbian beta now available
ESET has announced ESET Mobile Antivirus for Symbian is now available for public beta testing. Its features include: Heuristic Threat Detection – Provides real-time …
Video: The insecurity of shortened Twitter links
This is a demonstration of misleading applications that are being spread through malicious Twitter accounts.
Trend Micro endorses new anti-malware testing methodology
Trend Micro is endorsing a new third party anti-malware testing methodology that better reflects today’s “real-world” conditions instead of using antiquated …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does