Please turn on your JavaScript for this page to function normally.
Free guide to identity theft prevention

Intersections released the second edition of the Double Trouble ebook, that serves as a guide to identity theft prevention, including real-world scenarios where identity theft …

Check Point extends 3D security with Dynasec acquisition

Check Point announced the acquisition of privately held Dynasec, a provider of Governance, Risk Management and Compliance (GRC) solutions. The acquisition extends Check Point …

Network and security analysis with Trisul

Trisul is a new kind of network monitor that supplements fine grained traffic metering with flows, packets, and alerts. You can carry out any kind of network and security …

eFront multiple vulnerabilities

Multiple vulnerabilities have been reported in eFront, according to Secunia. These can be exploited by malicious users to conduct SQL injection attacks and compromise a …

Irresponsible IT disposal methods

Although data security is the primary concern when decommissioning IT equipment, only 61 per cent of companies currently data wipe all of their redundant computers, according …

ICSA Labs tests products against larger malware set

ICSA Labs, an independent division of Verizon, is now testing products in its Anti-Virus program against virus samples from not only the WildList (a database of real-world …

How does GFI LanGuard help network administrators?

Managing an IT network that is continuously changing and growing is not a trivial task. Once the network comprises more than a handful of machines, it becomes a …

Week in review: U.S. government satellites hacked, Halloween threats and the m00p gang investigation

Here’s an overview of some of last week’s most interesting new, podcasts and articles: Microsoft puts vulnerability exploitation into context Recently Microsoft …

Duqu not developed by Stuxnet author

The Dell SecureWorks Counter Threat Unit (CTU) research team has been analyzing the Duqu trojan which received a great deal of attention because it is similar to the infamous …

Combating Halloween malware threats

GFI Software released tips for spotting and combating malware attacks and threats in the run up to Halloween. Halloween has now become firmly established as a family event in …

Endpoint Protector 4 released

CoSoSys released a new version of their flagship device control and data loss prevention solution, Endpoint Protector. Offering enhanced protection, increased effectiveness …

National-scale iris and fingerprint identification

Neurotechnology announced MegaMatcher Accelerator 4.0, the latest update of the company’s multi-biometric software and hardware solution for high-volume, high-speed …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools