Please turn on your JavaScript for this page to function normally.
A look at Booz Allen leaked passwords

The recent attack against Booz Allen led to 90,000 leaked passwords. Unlike previous breaches where the passwords weren’t encrypted, it looks like in this case some care …

Three jailed for online banking attack

Three men have been jailed for a total of 13.5 years for their part in a sophisticated and concerted attack on the UK and international banking system following an …

Microsoft releases new preview of SQL Server “Denali”

Microsoft released the next public CTP of Microsoft SQL Server “Denali” packed with Business Intelligence (BI) improvements and innovations for relational …

Cisco refreshes Catalyst 6500 Series Switches

Cisco introduced the infusion of multiple innovations into its Catalyst 6500 Series Switches, the most widely deployed network switches on earth. At the heart of the makeover …

Microsoft fixes 22 vulnerabilities

In today’s Patch Tuesday, Microsoft released 4 bulletins addressing vulnerabilities affecting Windows and Office. Amol Sarwate, Vulnerability Labs Manager for Qualys, …

Travelers left 11,000 mobile devices at U.S. airports

Travelers left behind more than 11,000 laptops, tablet PCs, smartphones and USB sticks in airports in the United States during the past year. Credant was able to gather survey …

SquirrelMail multiple vulnerabilities

Multiple vulnerabilities have been reported in SquirrelMail, according to Secunia. These vulnerabilities can be exploited by malicious users to conduct script insertion …

Why Dropbox’s security changes are going to improve cloud computing

On July 1, Dropbox announced a revision to its terms of service, privacy policy and security overview document. While the intention of the update was to make Dropbox’s …

Spammers switch to compromised accounts, shift away from botnets

Spammers today favor compromised accounts for sending spam, gradually shifting distribution away from botnets, according to Commtouch. The changed tactic has emerged as spam …

140,000 children could be identity fraud victims

For most people, the thought of their children being victims of identity fraud is even more chilling than being a victim themselves. While children are less at risk for …

Critical vulnerability in Sun Java

ACROS Security has discovered a vulnerability in Sun Java, which can be exploited by malicious people to compromise a user’s system, according to Secunia. The …

How to secure a moving target with limited resources

Today, as security threats increase and regulatory requirements grow more complex, businesses are recognizing that compliance and security are business-critical priorities. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools