Please turn on your JavaScript for this page to function normally.
Rogue software details: Your Protection

Your Protection is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Your …

Data breaches cost Australian companies millions

Australian organizations experience costly data breaches with the average organizational cost of a data breach, including activities intended to prevent a loss of customer or …

First security cart for iPad

With the release of Apple’s iPad, schools and other organizations will be looking at e-readers in new and innovative ways. Datamation Systems introduced the first of a …

Security benchmarks for Windows 7 and Windows Server 2008

The Center for Internet Security (CIS) released its consensus security benchmarks for Windows 7 and Windows Server 2008. The free benchmarks provide prescriptive controls …

Secure communication with RetroShare

RetroShare is an open source cross-platform, private and secure decentralized communication platform. It allows you to securely chat and share files with your friends and …

(IN)SECURE Magazine issue 25 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 25 has been released today. Table of contents The …

First iPad cloud server application

Rackspace Cloud Pro is a free application for the iPad to enable users can turn on backups for a server, create new servers from backups, manage back-up scheduling, re-boot, …

U.S. infrastructure at risk from sophisticated cyber attacks

Nearly three-quarters of federal IT decision-makers who work in national defense and security departments or agencies say the possibility is “high” for a cyber …

Drobo FS: Data storage and protection

Data Robotics introduced Drobo FS which is designed for simple, expandable file sharing. By providing network file sharing capabilities along with automated data protection, …

Closing the last door

There’s always a risk of viruses lurking behind links on a website. Even well-known sites can contain dangerous links, especially those with a high level of public …

Generic and behavior-based threats increasing

Sunbelt Software announced the top 10 most prevalent malware threats for the month of March 2010. The list shows the continued prevalence of Trojan horse programs circulating …

Fighting Web flaws is futile

Do you ever find yourself driving down the road in an unfamiliar place and you get that gut feeling that you’re headed in the wrong direction? Well, I feel that’s …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools