Please turn on your JavaScript for this page to function normally.
Week in review: DDoS attacks, anti-Facebook worm and identity in the digital age

Here’s an overview of some of last week’s most interesting news, interviews, videos, reviews and articles: How to keep mobile devices secure while traveling …

Oracle VM VirtualBox 4.0 released

Oracle VM VirtualBox enables desktop or laptop computers to run multiple operating systems simultaneously, and supports a variety of host operating systems, including Windows, …

Hacker recovers stolen computer and gets criminal caught

In this video recorded at DEFCON, a hacker has his computer stolen, and tells the story of how he recovered it and got the criminal caught. Although the story is quite …

All versions of Internet Explorer under threat

Today Microsoft released a new security advisory to help protect users from a vulnerability affecting Internet Explorer versions 6, 7, and 8. Exploiting this vulnerability …

Steganos Privacy Suite 12 released

The latest version of the all-in-one data protection software, Steganos Privacy Suite 12, combines eight tools for optimizing user privacy protection, including: data …

Win a copy of Practical Lock Picking!

We are giving away two copies of “Practical Lock Picking“. For the first time, Deviant Ollam, one of the security industry’s best-known lockpicking teachers, …

Tips for creating a strong password

To ensure consumers stay safe online and enjoy this holiday season, Check Point outlines practical tips for creating a strong password. Choose a password that is at least 8 to …

Threat modeling best practices

In the video below, Robert Zigweid, senior security consultant at IOActive, talks about threat modeling best practices. The video was recorded at the OWASP AppSec USA 2010 …

Highest profile software failures of 2010

SQS Software Quality Systems compiled a list of the worst software failures of 2010 that have damaged reputations, impacted negatively on finances and caused stress to users. …

Passwords are the weakest link in online security

A ZoneAlarm survey showed that 79% of consumers use risky password construction practices, such as including personal information and words. The survey also revealed that 26% …

The shape of security and compliance in 2011

With increasingly stringent compliance mandates, a flurry of vendor consolidation, demands for audit reporting, and a spike in complex security breaches, 2010 has been a …

Rapid7 releases NeXpose 4.10

Rapid7 announced NeXpose 4.10, the latest version of its vulnerability management solution, providing enterprise customers with visibility and actionable intelligence for …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools