Please turn on your JavaScript for this page to function normally.
Web-based stealth attacks on network security will dominate 2011

Viruses will become more subtle and even harder to detect in 2011, and the primary line of attack will continue to be via the internet, according to Redscan. Malware is now …

Cisco IOS penetration testing with Metasploit

The Metasploit Framework and the commercial Metasploit products have always provided features for assessing the security of network devices. With the latest release, we took …

Virus yearbook 2010: Mariposa, Stuxnet and MSNWorm most noteworthy

PandaLabs is closing the year with a look at some of the unique and noteworthy viruses that have appeared over the last twelve months. The list of viruses is vast and varied, …

The world of mobile security fears and escalating compliance

2010 was another year of living dangerously. Companies dealt with huge increases in malware threats, growing mobile security concerns about consumer devices such as iPads, and …

Using social networks to profile, find and own your victims

In this video from DojoCon 2010, Dave Marcus, the Director of Security Research at McAfee Labs, illustrates the dangers of doing unintelligent things online. Dave shows you …

Cisco AnyConnect: Secure network connectivity for Apple iOS

Cisco AnyConnect Secure Mobility Solution, available from the App Store, offers highly secure network connectivity from any Apple iOS 4.1 device, improving the productivity of …

Upsurge of attacks aimed at Facebook, iPad and smartphones

If you thought 2010 was challenging, just wait for 2011. Below are our top five 2011 security predictions for the coming year from Websense: The Stuxnet sequels are coming, …

Free security tool detects vulnerable and outdated software

Secunia released version 2.0 of their Personal Software Inspector (PSI), a popular free security tool for home users that protects their personal and financial information …

Facebook scams soar

Facebook users should be careful about survey scams that are quickly spreading across the social network. Many Facebook users are struggling to clean up their accounts once …

How to keep mobile devices secure while traveling

“Tis the season to be jolly – and to leave sensitive corporate information behind at the airport! According to telephone interviews with the lost property offices …

5 steps to detect and prevent fraud in the public sector

Where there is money, there is the potential for misappropriation or misuse – intentional or otherwise. Nowhere is this more apparent than in governments where funds are …

Week in review: Gawker breach, social engineering and security predictions for 2011

Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Gawker Media breach claimed by Gnosis The credit for the breach of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools