Please turn on your JavaScript for this page to function normally.
Creating a secure firewall policy for a large company

When it comes to a network security policy, there often seems to be a direct tradeoff between security and maintainability. This doesn’t always have to be the case. Even …

Osama bin Laden spam invades Facebook

I guess the news about the death of Osama bin Laden is starting to reach everyone around the world. Every time something big as this happens, people get curious and start …

Network metering and forensics tool Trisul gets new UI

Trisul is a Linux based application that passively listens to network traffic and tracks a number of traffic metrics across all layers. It correlates these traffic metrics …

Secure Belkin keyboard-video-mouse switch

Belkin released its new line of Advanced Secure Keyboard-Video-Mouse (KVM) switches that provide a host of new features, including innovative data path isolation. The new …

OpenBSD 4.9 released

OpenBSD 4.9 is here. To get the files for this release either order a CDROM or check out one of the FTP pages for a list of mirrors. Generic network stack improvements: …

Total cost of Epsilon breach could reach $4 billion

E-mail services firm Epsilon will face years of repercussions and up to $225 million in total costs as a result of its recent data breach, a massive event that indicates the …

Week in review: Nikon image authentication system cracked, fake AV for mobile platform and the PSN hack

Here’s an overview of some of last week’s most interesting news, articles and reviews: Wardriving gang targeting small firms A group of individuals who are …

Securing the cloud and securing data in the cloud are not the same

This article will take a look at five of the most impactful vulnerabilities of storing data in the cloud, and offer details on why the most important thing for CSOs and …

Firefox 4.0.1 fixes several security issues

Mozilla released Firefox 4.0.1 that fixes several security issues as well as stability issues. Miscellaneous memory safety hazards Mozilla developers identified and fixed …

Rapid adoption of hosted email compliance

Financial institutions are rapidly moving to hosted email compliance and storage services to deal with increasing costs, risks and regulations, according to a study conducted …

Researchers crack Nikon image authentication system

Credibility of photographic evidence may be extremely important in a variety of situations. Courts, news agencies and insurance companies may accept digitally signed …

Page-integrated encryption for protecting credit cards on the web

Voltage Security announced a new encryption breakthrough for protecting personal data entered by consumers on web pages called PIE for Page-Integrated Encryption. The company …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools