Please turn on your JavaScript for this page to function normally.
Scammers’ link architectures

As much as it hurts us to admit, online scamming shares many of the characteristics of a legal business. Why? Because, in the end, they have the same goal – revenue. To …

Rogue software details: PC-Guide

PC-Guide is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

The evolution of PCI DSS

The Ponemon Institute conducted a research study about the upcoming version of the Payment Card Industry Data Security Standards (PCI DSS), a new set of standards expected to …

ID Vault for iPhone: Single tap login for online accounts

White Sky introduced a secure way to access any online account from the iPhone with its ID Vault for iPhone. ID Vault is the first iPhone app that offers true single-tap …

McAfee unveils new firewall solutions

McAfee released Firewall Enterprise 8. Next generation capabilities include advancements in firewall management, application discovery and protection, and integrated layers of …

Automated penetration testing tools

Codenomicon released a toolkit for automated penetration testing which eliminates unnecessary ad-hoc manual testing. The required expertise is built into the tools making …

Enigma self-encrypted drive

Origin Storage launched the Enigma self-encrypted drive (SED). Incorporating the 256-bit AES hardware encrypted 2.5″ hard drives from Toshiba it provides permanent full …

Elcomsoft uses new hardware to speed up password recovery

Elcomsoft announced the support of Tableau TACC1441 hardware to accelerate the recovery of Wi-Fi passwords and password-protected iPhone and iPod backups. The use of a single …

A ZeuS killer? Not really

The “Kill ZeuS” feature of the SpyEye crimeware toolkit is more likely to bring in more money to the ZeuS toolkit makers than to encroach upon their territory. How …

Facebook shows its true face

The F8 conference has ended, and Facebook has started making changes and setting the stage for the announced spread through the entire Internet. They might not put it like …

Tenable releases SecurityCenter 4

Tenable released SecurityCenter 4, the enterprise-class management console for Tenable’s Unified Security Monitoring suite of products. By centralizing system and event …

Snort 2.8.6 released

Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol …

Don't miss

Cybersecurity news