Please turn on your JavaScript for this page to function normally.
Advanced cloud security tools

Sun Microsystems unveiled open source cloud security capabilities and announced support for the latest security guidance from the Cloud Security Alliance. The open source …

New book: “The Executive MBA in Information Security”

Supplying a complete overview of the concepts executives need to know, The Executive MBA in Information Security provides the tools needed to ensure your organization has an …

Wireshark 1.2.5 fixes security vulnerabilities

Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. Wireshark 1.2.5 fixes the following vulnerabilities: …

VoIP vulnerability trends

McAfee Labs released a very interesting white paper about VoIP vulnerability trends and targets, and about protocol- and application-level attacks. They first observed an …

Secure cloud computing adoption guidance

The Cloud Security Alliance (CSA) issued the second version of its “Guidance for Critical Areas of Focus in Cloud Computing” whitepaper which outlines key issues …

Rogue software details: VaccineSystem

VaccineSystem is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Top 5 trends that will dominate the security landscape

Lavasoft’s list of security predictions for 2010 anticipates the top threats that Internet users should be aware of this coming year as cyber criminals adapt their …

Monetary and reputation threats

In a recent survey about identity theft, Americans said their number one fear was having bank account, credit card or other personal information stolen from their computers. …

New book: “Cloud Security and Privacy”

Cloud computing has emerged as a popular way for corporations to save money that would otherwise go into their IT infrastructure. However, along with the promise of cloud …

Free crime mapping iPhone app

The new CrimeReports iPhone app features official, up-to-date crime data directly from more than 600 law enforcement agencies across North America. The app is free to download …

Top vulnerable applications in 2009

Bit9 unveiled its annual report on the top popular consumer applications with known vulnerabilities. The list, published in the research brief is created for IT professionals, …

Migrating to Windows 7: A three step plan

With the release of Microsoft’s new Windows 7 operating system, many IT managers will be thinking about when to make the move to the new OS and how to make the process …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools