Please turn on your JavaScript for this page to function normally.
New web security and web filtering solutions for small businesses

GFI Software announced the release of the latest version of GFI WebMonitor for ISA Server, a solution that gives administrators comprehensive control over corporate web usage …

Designing a PCI-Compliant Log Monitoring System

Log monitoring activities are an integral part of Requirement 10 of the PCI Data Security Standard and it can be difficult to understand how the different logging portions of …

MSN worm with downloader functionality

The most important malware samples analyzed by PandaLabs this week are the MSNHorn.A and Nugache.M worms, and the Legmir.ASG Trojan. MSNHorn.A spreads through MSN Messenger by …

Guide to Online Antivirus Solutions Part 5: BitDefender Online Scanner

Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …

Video explaining Zhelatin/Storm Gang’s activities

The Zhelatin/Storm Gang has been very busy lately. Their spamming tactics have changed from sending an attachment to sending a link that directs recipients to an IP Address. …

CORE GRASP for PHP – detecting and blocking injection vulnerabilities

CORE GRASP for PHP is a web-application protection software aimed at detecting and blocking injection vulnerabilities and privacy violations. As mentioned during its …

AOL identity thief faces seven year jail sentence

Sophos is reminding computer users of the threat posed by phishers following the conviction of a 23-year-old identity thief who targeted users of AOL. Michael Dolan, formerly …

Gang of four charged in joss-stick worm case

Li Jun, Wang Lei, Zhang Shun and Lei Lei are facing charges in a people’s court in Hubei Province in connection with the creation and distribution of the Fujacks worm. …

Super Ninja Privacy Techniques for Web App Developers

If I keep my documents on Google Docs, my mail on Yahoo Mail, my bookmarks on del.icio.us, and my address book on .Mac, is there any point in talking about the privacy of my …

Hot Summer Book Giveaway – Winners announced

The lucky winners in our “Hot Summer Book Giveaway” are: 1) Lennox B. – “Security Metrics” 2) Mathew L. – “The Art of Software …

2008 promises exceptional demand for professional certification

(ISC)2 has expanded its global education offerings to support the next phase of Department of Defense (DoD) Directive 8570.1 — a phase that will involve an unprecedented …

2/3 of people worried about information shared on Facebook

Research conducted by IT security and control firm Sophos has revealed that fifty percent of workers are being blocked from accessing Facebook by their employers who are …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools