KillSwitch technology catches brute-force attacks
Confident KillSwitch is an authentication technology that can identify and proactively defend against brute force attacks on account logins, password reset processes, …
Windows 7 Inside Out
Windows 7 Inside Out, Deluxe Edition is updated with 300+ new pages of information for working with Windows 7. This comprehensive reference to Windows 7 packs hundreds of …
Domscheit-Berg says WikiLeaks is lying, new batch of cables released
Following WikiLeaks claim that among the 3,500+ unpublished files destroyed by former WikiLeaks member Daniel Domscheit-Berg were a number of highly sensitive documents …
Install one Trojan, get three more
Downloader Trojans are often used by cyber crooks to thoroughly infect systems in order to extract anything that might be of value to them. Trojan.Badlib is a particularly …
PHP 5.3.8 fixes security issues
The PHP development team released PHP 5.3.8. This release fixes two issues introduced in the PHP 5.3.7 release: Fixed bug #55439 (crypt() returns only the salt for MD5) …
ICSA Labs to certify broadband home routers
Hackers are increasingly viewing home routers as a means of gaining access to sensitive personal data. To help combat this threat, ICSA Labs is offering a new program under …
Photobucket app helps catch a thief
Photobucket’s mobile app has played an unexpected role in the catching of a purse-snatching thief in California. The app, set to automatically upload the pictures taken …
Facebook revamps its Privacy Settings
Facebook’s Privacy Settings have long been a thorn in privacy advocates’ side. They deemed it to complex for a typical user to understand, and have often decried …
Five mistakes companies make in their cloud strategies
When a company doesn’t fully define what the cloud can do for it, it leads to a less-than-optimized strategy that under serves the organization. To help IT pros avoid …
The Basics of Hacking and Penetration Testing
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to …
Yale confirms 10-month-long data breach
Names and Social Security numbers of some 43,000 people that were affiliated with Yale University back in 1999 have been accessible to users of the Google search engine for …
Fake Facebook friend request email leads to malware
Facebook users are once again being targeted with fake emails purportedly coming from the social network, alerting them to a friend request. A click on the offered …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware