Please turn on your JavaScript for this page to function normally.
Video: History of the JavaScript security arsenal

In 2006 we had the first JavaScript port scanner. The same year we saw the incarnation of more advanced tools such as AttackAPI, Carnaval and Backframe. A year later we saw …

The cloud will impact the way security is consumed

Increased adoption of cloud-based computing is expected to impact the way security is consumed as well as how key government agencies will prioritize security of public cloud …

Twitter bug gives 3rd-party apps access to users’ Direct Messages

A Twitter bug allowed third-party applications to access Direct Messages of users who signed in to the apps by using their Twitter account, reported IOActive researcher Cesar …

Video: Data mining a mountain of vulnerabilities

Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. Veracode used static binary analysis on …

GFI EventsManager now with active monitoring

GFI Software announced that GFI EventsManager now includes the active network and server monitoring capabilities found in the NetworkServerMonitor solution. This new …

McAfee outlines the future of business security

McAfee announced its strategy for building upon Security Connected, the framework in which security products and services work together to safeguard businesses with better …

New nCircle security appliance cuts vulnerability scan time

nCircle announced the Device Profiler 4000 (DP 4000), a high performance vulnerability scanning appliance designed to support vulnerability scanning requirements including web …

Proposed EU cyber security law will require proactive network security

Last week, the European Commission proposed new legislation to require major tech firms like Google and Facebook to report any security breaches to local cyber crime …

PowerDNS 3.2 expands DNSSEC support

The PowerDNS Authoritative Server enables authoritative DNS service from all major databases, including but not limited to: MySQL PostgreSQL Oracle SQLite LDAP DB2 Sybase …

The sharp rise of UK e-crime

News that e-crime accounts for 37% of all retail crime, reflects the changing nature of the threats that today’s retailers are facing. As brands struggle to compete on …

Video: Hacking Huawei VRP

Huawei routers are no longer devices only seen in China. Entire countries run their Internet infrastructure exclusively on these products and established tier 1 ISPs make …

Cyber security needs to be a board level issue

As part of the much talked about Cyber Security Strategy, the UK Government is “committed to helping reduce vulnerability to attack and ensure that the UK is the safest …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools