Please turn on your JavaScript for this page to function normally.
Virtualisation adopters face security challenges

Virtualisation is moving into the mainstream with 50% of IT professionals already using this new technology, or planning to do so within the next 18 months, reveals a survey …

USB Flash Drive worm from the “good guys”

Sophos has discovered a worm which copies itself onto removable drives, such as USB flash drives, in an attempt to spread information about AIDS and HIV. The LiarVB-A worm …

Secure Computing updates its URL filtering solution

Secure Computing announced a new version of SmartFilter 4.2 with TrustedSource. It provides granular protection against today’s Web 2.0 threats, allowing companies to …

Designing IS strategies to stay ahead of network threats

Headline-grabbing news about computer security breaches and their devastating consequences on an agency and its constituents is the stuff of every CSO’s nightmare, …

Hackers insert footage of nuclear explosion into webcam

Czech hackers managed to get access to a webcam and insert realistic footage of nuclear explosion. The incident was broadcasted on the Czech TV programme Panorama on Sunday. …

Reactions to the HP acquisition of SPI Dynamics

Here are a couple of quotes found while traversing today’s media releases regarding the HP’s acquisition of SPI Dynamics. Microsoft to follow? “This is the …

Break a security product beta and win prizes

BitDefender is inviting the public to test BitDefender Total Security 2008, the flagship product of the company’s upcoming family of Internet security products. Among …

Internet security forecast revisited

McAfee just revisited its top ten predictions for security threats in 2007. Their research shows that threats including data-thieving phishing Web sites are on the rise, as …

Capabilities and weaknesses of token-based authentication

From Martin McKeay’s blog: As most security professionals know, passwords are a losing proposition. We use them because the capability comes with your operating system, …

HP to acquire web application security expert

HP today announced that it has signed a definitive agreement to acquire SPI Dynamics, Inc., a provider of web application security assessment software and services, to further …

Business model based on the malicious MPack tool

PandaLabs has discovered the new 0.90 version of the malicious tool Mpack, available for US$1000 on the Web. This application could be defined as “a kit for installing …

A closer look at Tor privacy tool

Tor is a tool that can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. This is a graphical …

Don't miss

Cybersecurity news