Please turn on your JavaScript for this page to function normally.
Accelerating wireless network security audits

ElcomSoft announced the availability of GPU-accelerated version of Elcomsoft Wireless Security Auditor 1.0, a product to audit wireless network security by attempting to …

USB encryption drive defense against autorun malware attacks with Hydra PC

SPYRUS announced the Hydra Privacy Card (Hydra PC) family of USB encrypting devices is immune from USB autorun malware attacks. Hydra PC, which utilizes the most advanced …

Details on the Downadup worm that is causing new outbreaks

Win32.Worm.Downadup worm made its first appearance late November 2008, exploiting the MS08-067 vulnerability to spread unhindered in local area networks. Its purpose was to …

Video: Barbara Hershey, Blogspot and fake anti-virus software

In the video below, Paul Baccas of SophosLabs explores how fake anti-virus software designed to scare the unwary out of money is being planted into Google Search results …

Gartner survey shows IT spending to be flat in 2009

As enterprises face a challenging economic environment, IT spending budgets will be essentially flat with a planned increase of 0.16 percent in 2009, according to results from …

2009 to see more malware on virtualization platforms and mobile devices

AppRiver published of its year-end spam report, State of Security 2008, and the Threat and Spamscape Forecast for 2009. According to report author, AppRiver Senior Security …

IBM unveils Rational AppScan Standard Edition 7.8

IBM Rational AppScan Standard Edition is a Web application security testing tool that automates vulnerability assessments. Here’s a short list of the interesting new …

Tackling the authentication nightmare

In the new edition of the HNS podcast, Jonathan Craymer, chairman of GrIDsure talks about tackling the authentication nightmare by getting the right balance between security …

Anonymous proxies a major security concern for IT managers

Web filtering specialist Bloxx announced the results of its independent Anonymous Proxy Survey, which reveals that an alarming 90% of IT Managers in the educational sector …

IT security standards planetarium

atsec information security today published the “IT security standard planetarium”, which depicts the relationships among many IT security standards. You can choose …

New Deep Security server and application protection software

Third Brigade announced the availability of Third Brigade Deep Security 6, the next generation in server and application protection for dynamic datacenters. It is the first …

Less than six weeks till SCALE 7X

Southern California Linux Expo (SCALE 7x) is one of the conferences we are media sponsoring via our publications. The event starts in just over a month and here is the latest …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools