Please turn on your JavaScript for this page to function normally.
10 online safety tips

Parents and teachers should avoid overlooking the dangers associated with the Web and the risks they pose to children. Kids today are fascinated by the Internet and extremely …

New Data Loss Prevention solution from CheckPoint

Check Point announced its new network-based Data Loss Prevention (DLP) solution that helps businesses move data loss from detection to prevention by pre-emptively protecting …

Future air travel security risks, privacy and social implications

The European Network and Information Security Agency (ENISA) has analyzed the risks associated with a future air travel scenario, enabled with “Internet of …

iPhone unlocking tricks get PCs into trouble

A malware-spreading mechanism targeting the “iPhone unlocking” fans goes to prove that cybercrime is never short of imagination. This is how the story goes: you …

Endpoint data leak prevention still a major headache

More than one in three (38%) of respondents are still failing to deploy any form of data leak prevention, whether that be device control, endpoint DLP or DLP appliances. …

Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 available

Visual Studio 2010 and .NET Framework 4 have something for every developer. The new editor, now using Windows Presentation Foundation, supports concepts such as the use of …

Identity Management for the cloud: Taking the next step

Identity and Access Management (IAM) in its present do a pretty good job dealing with internal users and systems. Unfortunately, that isn’t what most companies really …

Rogue software details: Antivirus Suite

Antivirus Suite is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

New books: Windows Server 2008, Microsoft Forefront Threat Management Gateway

Windows Server 2008 Administrator’s Pocket Consultant, Second Edition includes coverage of Windows Server 2008 R2 enhancements, including Hyper-V with Live Migration, …

Week in review: Phone phishing, botnet monetization, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Insufficient employee security training for the cloud Despite …

Prevent unauthorized electronic fund transfers

Authentify released the ETF Verifier application which enables financial applications and payment platforms to alert legitimate account owners via phone whenever a new payee …

Hacking Web 2.0 JavaScript: Reverse engineering, discovery and revelations

Today, applications are becoming increasingly dependent on the Internet as a foundation platform. As the application domain increases worldwide, the variety of web content …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools