Please turn on your JavaScript for this page to function normally.
5 tips for protecting against spam attacks

Whether you’re at work or at home, spam causes headaches and wastes time, forcing you to trawl through your inbox to work out which mail is legitimate and which is spam. …

How to protect employees with a web filtering solution

Let’s face it, this is not your father’s Internet (or, for those of us who first went online in the late 90’s, even John Postel’s Internet.) As …

One in five spam messages comes from the U.S.

Sophos published the latest report into the ‘Dirty Dozen’ spam-relaying countries, covering the third quarter of 2010. Since the second quarter this year, the spam …

The value of your credentials

As surprising as this may sound, earlier this year stolen twitter credentials were valued at almost $1,000. When compared to credit card details that fetch less than $1, why …

Photos: RSA Conference Europe 2010

RSA Conference Europe 2010 at a glance: keynotes, presentations, mingling on the expo floor.

Portable device management and protection for Mac users

Cososys has released Endpoint Protector 2009, a new version of its device management, endpoint security and data loss prevention solution for Mac/Apple computers. The newly …

Dangers of wireless network use still unknown to many

Nearly half of home wi-fi networks can be hacked in less than five seconds, according to a new study. In an ‘ethical hacking’ experiment conducted across six UK …

Agentless configuration auditing

nCircle announced the new version of its Configuration Compliance Manager, an agentless configuration auditing and file integrity monitoring solution that automatically …

Poor password practices and how to change them

When it comes to safeguarding personal information online, many people leave their virtual keys in the front door. A survey of more than 2,500 people from the United States, …

Full-service virtual SIEM solution

LogLogic announced the release of a full-service virtual SIEM solution. Leveraging the recently released LogLogic 5 software, LogLogic’s MX Virtual delivers all the …

Oracle’s critical patch update advisory for October 2010

Oracle just released a new Critical Patch Update, a collection of patches for multiple security vulnerabilities. The update also includes non-security fixes that are required …

49 vulnerabilities fixed in record Patch Tuesday

In today’s mammoth Patch Tuesday, Microsoft delivers 16 security bulletins that address 49 vulnerabilities affecting Windows, Internet Explorer, Microsoft Office, and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools