Please turn on your JavaScript for this page to function normally.
Microsoft puts a spotlight on browser security

The Internet is growing. With the steady rise of the number of users from emerging markets getting computers and joining the online world, opportunities abound for the bad …

Gathering data and its security implications

At the RSA Conference Europe Advisory Board roundtable in London, new board members and experts Dr. Herbert Thompson and John Madelin, Verizon Business, headed a stimulating …

Q&A: Fuzzing

Ari Takanen is the CTO of Codenomicon and a regular speaker at security conferences. He’s presenting today at RSA Conference Europe and in this interview he discusses …

The dangers of exposing information on social networking sites

In this podcast, Dr. Herbert Thompson, the Chief Security Strategist at People Security, discusses the variety of information that we, and those connected to us, disclose via …

Video: Overview of RSA Conference Europe 2009

In this video, RSA Conference Europe 2009 Manager Linda Lynch gives an overview of the event, taking place October 20-22 in London, UK.

How social networking can hurt you

Let’s put aside all the positive reasons to use social networking services and focus on the dark side. Most of the time, users don’t even realize how much private …

The future of information security is now

The information security industry is one of the very few that hasn’t been severely impacted by the economic downturn. Many companies in this sector have thrived in the …

Q&A: Mac OS X security and forensics

Sean Morrissey is currently employed by Paradigm Solutions as a Computer Forensic Analyst at the U.S. Department of State and was previously employed by CSC as a …

10 IT security growth areas for 2010

Overall, the recession is likely to be a major factor in IT security purchasing decisions in the next year, with companies looking for solutions which will reduce ongoing …

Taking the shield to protect mobile computing

Technology has come a long way in the last 850 years, but we can still learn a thing or two from our medieval ancestors. Take security, for example. After the Norman conquest …

Visualizing compiled executables for malware analysis

Reverse engineering compiled executables is a task with a steep learning curve. It is complicated by the task of translating assembly into a series of abstractions that …

A closer look at Lavasoft Ad-Aware Free 8.1.0

Ad-Aware Free is the basic, home-use-only version of Lavasoft’s popular anti-spyware and anti-malware tool. To name just a few of its new features: Genotype detection …

Don't miss

Cybersecurity news