Please turn on your JavaScript for this page to function normally.
Simple safe web browsing tips

The most important thing to remember about cyber security is that people using their touchpad or mouse are the last line of defense. Technologies such as anti-virus, safe …

Security vulnerabilities of DVB chipsets

This video from Hack in The Box Amsterdam 2012 focuses on the security of audio and video MPEG streams broadcasted to subscribers via their set-top-boxes by a digital …

Microsoft acquires Perceptive Pixel

Microsoft and Perceptive Pixel announced that they have entered into a definitive agreement under which Microsoft will acquire PPI, a provider of multi-touch display …

Android Trojan attacks European banks

Recently Trusteer discovered the first Tatanga-based man in the mobile (MITMO) attack as well as new SPITMO configurations which are targeting Android mobile banking users in …

Restoring critical applications a top concern

Organizations now operate in a world where employees and customers alike expect critical services to be available and accessible at all times, and it’s forcing IT to …

Websense TRITON now with new malware and data theft defenses

Websense announced 10 new malware and data theft defenses, spear phishing protection with cloud sandboxing, and a forensic reporting dashboard with security intelligence. With …

WatchGuard updates XTM operating system

WatchGuard unveiled the latest release of the operating system that forms the backbone of WatchGuard XTM security solutions – WatchGuard Fireware XTM 11.6. In …

Free tool protects Internet connections from DNS Changer shutdown

Bitdefender released a tool to prevent computer users worldwide infected with DNS Changer malware from losing their internet connection on July 9th. The U.S. Federal Bureau of …

Open source IDS Suricata 1.3 released

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Several characteristics of …

Enterprise log managers: An unsexy but vital tool

Ultimately, the goal of Enterprise Log Management (ELM) is to get your most critical events escalated to your operations staff to react and respond with the appropriate …

Worldwide IT spending to surpass $3.6 trillion in 2012

Worldwide IT spending is on pace to reach $3.6 trillion in 2012, a 3 percent increase from 2011 spending of $3.5 trillion, according to the latest outlook by Gartner. …

Cuckoo Sandbox: Automated malware analysis

Cuckoo Sandbox is an open source automated malware analysis system. It started as a Google Summer of Code 2010 project with The Honeynet Project and evolved into being one of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools