Please turn on your JavaScript for this page to function normally.
6 million malicious files found in the past 3 months

Malware has reached its highest levels, making the first six months of 2010 the most active half-year ever for total malware production, according to a new McAfee report. At …

Security check for broadband home routers

Attackers are increasingly targeting home routers as a means of gaining access to sensitive personal data. To help combat this threat, ICSA Labs is offering a new program …

64GB secure portable USB drive

MXI Security offers a 64GB capacity device for its Stealth line of secure USB devices, suited for government customers that require high-capacity devices for Secure USB …

Gartner: Worldwide enterprise IT spending to grow

Worldwide enterprise IT spending across all industry markets will grow 2.9 percent in 2010 and surpass $2.4 trillion, according to Gartner. Analysts said that all industries …

Wipe technology for self-encrypting disk drives

Toshiba announced Wipe for Toshiba Self-Encrypting Drive (SED) models, a technology that allows special security capabilities, such as the world’s first ability for …

Tektronix Communications acquires Arbor Networks

Tektronix Communications has signed a definitive agreement to acquire Arbor Networks. The acquisition is expected to close in September and the terms of the acquisition are …

New web application firewalls from Fortinet

Fortinet announced two new appliances for its FortiWeb family of web application firewalls – the FortiWeb-1000C, designed for mid-to-large enterprises, and …

Free protection against Blackhat SEO threats

Zscaler released Search Engine Security (SES), a free solution specifically designed to combat Blackhat SEO attacks. Such attacks leverage Search Engine Optimization (SEO) …

Colleges breach students’ sensitive information

College students nationwide can be especially vulnerable to identity theft because they often give out personally identifiable information. Some universities have even been …

VirtualBox: Full virtualizer for x86 hardware

VirtualBox is an open source general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use. Some of the features of VirtualBox are: …

How to render SSL useless

In this video from OWASP AppSec Research 2010, Ivan Ristic from Qualys talks about breaking SSL.

Week in review: Signs of computer infection, iPhone jailbreaking and Facebook mobile privacy

Here’s an overview of some of last week’s most interesting news and videos: Web 2.0 security in the workplace The use of social networking applications has …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools