Zeljka Zorz
The crime organizations behind most cyber criminal activity
Money makes the world go around. Those who don’t have it, want it, and those who have it – want more of it. Organized crimes operations are know for their …
10 software apps for encryption for the Mac
In this day and age, nobody can afford NOT to use encryption, and the sooner we all get used to using it on a daily basis, the better. We live in a world where secrets are …
Googling Security: How Much Does Google Know About You?
Have you ever thought about the price you pay for using Google's services? They say it's all for free, but you're actually paying for it by allowing them to collect personal …
97 Things Every Software Architect Should Know
Don't we all sometimes wish we could just TAKE good advice, instead of thinking we have found a better way and make the mistakes we've been warned about? This book is a …
A closer look at GFI LANguard 9
GFI LANguard is a network security scanner. It performs vulnerability assessments, identifies all possible security threats and provides the tools to remediate vulnerabilities …
Cyber Crime Fighters: Tales from the Trenches
Every new technology has the capacity to be used for good or for evil. And where is a new way to commit crimes, criminals will find it. That being said, this book covers the …
Head First Networking
This book is really good example of why you shouldn't judge a book by it's cover. If you flip through it (and you're not acquainted with O'Reilly's "Head First" series), the …
A closer look at Nero BackItUp & Burn
Nero BackItUp & Burn lets you back up files to your hard drive or to online storage, schedule automatic backups, burn music, videos, photos, and data to CDs, DVDs, and …
A closer look at SpywareBlaster 4.2
SpywareBlaster prevents the installation of ActiveX-based spyware, adware, dialers, browser hijackers, and other potentially unwanted programs. It can also block …
A closer look at Little Snitch 2.1.4
Little Snitch is a Mac tool that protects private data from undesirable transmission. It informs you whenever a program attempts to establish an outgoing Internet connection. …
A closer look at Spybot – Search & Destroy 1.6.2
Spybot – Search & Destroy can detect and remove adware files and modules from your computer. Spybot also can clean program and Web-usage tracks from your system. …
A closer look at MacScan 2.6.1
MacScan detects, isolates, and removes spyware applications such as keystroke loggers and trojan horses. Blacklisted cookie scanner removes tracking cookies without saved …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month