Please turn on your JavaScript for this page to function normally.
Does Web 2.0 need Web security 2.0?

Web 2.0 is thriving, and so too are applications that take advantage of this technology. Interactive sites like LinkedIn, Twitter and even company websites are becoming ever …

Collection of security checks for Linux

Buck Security is a collection of security checks for Linux. It was designed for Debian and Ubuntu servers, but can be useful for any Linux system. The aim of Buck Security is, …

Introducing the Cyber Defence conference

Cyber warfare has become a major concern for international governments, military and civil agencies over the past few years. A recent wave of cyber attacks against NATO member …

Week in review: Compromised hardware, AV failures and published IE 0-day exploit

Here’s an overview of some of last week’s most interesting news, articles and interviews: Zuckerberg hacked into journalists’ email? The Facebook co-founder …

Apple Safari 4.0.5 patches critical vulnerabilities

Safari 4.0.5 includes improvements to performance, stability, and security. ColorSync An integer overflow that could result in a heap buffer overflow exists in the handling of …

PeerSec MatrixSSL: Embedded SSL and TLS implementation

MatrixSSL is an embedded SSL implementation designed for small footprint applications and devices. It allows secure management of remote devices. PeerSec Networks offers a …

New Federal IT security certification program

A new certification program specifically designed and tailored to help secure the nation’s Federal information technology systems was unveiled today. The certification …

Koobface worm doubles its number of command and control servers

The shut down and recovery of the Troyak-as command and control center (C&C) for the active Zeus botnet was good news for the whole IT security community. Unfortunately, …

It’s time to embrace the shift to the cloud

The software industry is entering another age of astonishing innovation. It’s a time when not only software is advancing at a fast pace, but so too are hardware devices …

File sharing networks open door to identity theft

According to the Washington Post, in any given second, nearly 22 million people around the globe are on peer-to-peer file-sharing networks downloading and swapping movies, …

Employees continue to put data at risk

According to a Ponemon Institute study, business managers continue to pose the greatest threat to sensitive company information such as customer records, health information …

13m users worldwide affected by Mariposa botnet

Following the worldwide shutdown of the Mariposa botnet last week, Panda Security reported today that the massive botnet had infected 13 million computers in 190 countries and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools