Please turn on your JavaScript for this page to function normally.
Backdoor discovered in popular financial planning software

Elcomsoft has discovered a backdoor in Intuit’s Quicken software. Millions of people worldwide have chosen Quicken as their financial software, in part because of …

PGP Corporation receives $27.3 million in Series C funding

PGP Corporation has announced it has closed $27.3 million in Series C funding. The round adds new investors Intel Capital, the venture capital arm of Intel Corporation, and …

Tips for protecting against malware, scams and identity theft

Don’t add friends you don’t actually know when using social networking sites. Often the “free” code available in social networking sites, such as …

Spammers turn to PDF files in latest pump-and-dump scam

Sophos is warning of a new ‘pump-and-dump’ stock spam campaign which uses a PDF file to hoodwink potential investors. Sophos has identified email messages being …

Virtualisation adopters face security challenges

Virtualisation is moving into the mainstream with 50% of IT professionals already using this new technology, or planning to do so within the next 18 months, reveals a survey …

USB Flash Drive worm from the “good guys”

Sophos has discovered a worm which copies itself onto removable drives, such as USB flash drives, in an attempt to spread information about AIDS and HIV. The LiarVB-A worm …

Secure Computing updates its URL filtering solution

Secure Computing announced a new version of SmartFilter 4.2 with TrustedSource. It provides granular protection against today’s Web 2.0 threats, allowing companies to …

Create Password Protected PDF Files On Your Mac

In the office I often use different word processors and text writing software applications. The majority of my output files are generated by the nifty (especially for a long …

Designing IS strategies to stay ahead of network threats

Headline-grabbing news about computer security breaches and their devastating consequences on an agency and its constituents is the stuff of every CSO’s nightmare, …

Hackers insert footage of nuclear explosion into webcam

Czech hackers managed to get access to a webcam and insert realistic footage of nuclear explosion. The incident was broadcasted on the Czech TV programme Panorama on Sunday. …

The Exploit Development Process

Alexander Sotirov is a Vulnerability Researcher at Determina Inc. In this video, made at Black Hat Europe, he discusses on a general note how exploit writers develop exploits.

Reactions to the HP acquisition of SPI Dynamics

Here are a couple of quotes found while traversing today’s media releases regarding the HP’s acquisition of SPI Dynamics. Microsoft to follow? “This is the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools