Please turn on your JavaScript for this page to function normally.
Spammed out “shocking photos” emails contain malicious payload

Sophos is urging computer users to think before opening unsolicited email attachments following the discovery of a widespread malicious spam campaign that claims to contain …

Poorly managed web encryption confusing consumers

Nearly half of consumers experiencing website security alerts ignore the alert and proceed to do business on the site, putting at risk their personal and financial data, …

List of ICSA Labs certified Virtual Private Network products

ICSA Labs has certified safeguards for four virtual private network products. The VPN products earning ICSA Labs Secure Sockets Layer-Transport Layer Security (SSL-TLS) VPN …

Guide to Online Antivirus Solutions Part 2: Trend Micro HouseCall

Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …

New Web application firewall appliance based on ModSecurity

Breach Security announced a new addition to its popular ModSecurity Pro web application firewall appliances product line with the launch of the ModSecurity Pro M1100. This new …

Virtual e-mail security appliance

IBM unveiled a virtual e-mail security solution based on the existing Proventia Network Mail Security System from its Internet Security Systems division. By allowing robust …

Top 20 virus list for July 2007

The activity of the botnet that was created in May via the Agent.bqs Trojan was only reaching its “design capacity” in June; by July it was in full swing. Another …

Watch the winning videos of college student security awareness contest

The EDUCAUSE/Internet2 Computer and Network Security Task Force, the National Cyber Security Alliance, and ResearchChannel have announced six winners of a computer security …

“Rough cut” of to-be-published book on Ajax security

Addison-Wesley released a “Rough Cut” of the forthcoming book Ajax Security. Rough Cuts, from Safari Books Online, allow readers to gain access to portions of a …

New application security software from SPI Dynamics

S.P.I. Dynamics announced WebInspect, according to the company, the first and only web application security assessment tool to be re-architected to thoroughly analyze …

iPods and other portable storage devices still a growing threat for data leakage

CREDANT Technologies released a survey of 323 directors, managers, CIOs, CEOS and others from the fields of IT, banking and finance, medicine, government, and education on the …

Roaming wireless spammer escapes cell-time

Sophos is reminding computer users about the importance of securing their wireless internet access following the sentencing of a man who sent pornographic spam while driving …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools