Please turn on your JavaScript for this page to function normally.
Snort Alert Monitor 0.6.0 released

Snort Alert Monitor works in conjunction with Snort and provides much better reporting and real-time statistics that aren’t available with Snort alone. New in Snort …

The security nightmare formula

According to the Cisco 2009 Annual Security Report, small errors on the part of computer users or their IT departments may not wreak havoc on their own, but in combination, …

iptables 1.4.6 released

iptables is the userspace command line program used to configure the Linux 2.4.x and 2.6.x IPv4 packet filtering ruleset. It is targeted towards system administrators. …

E-card malware scam

Red Condor issued a warning about a new e-Card spam campaign that appears to come from American Greetings’ BlueMountain.com. The email, with the subject line “You …

Threats and threat technologies in 2010

Trend Micro released a report titled “The Future of Threats and Threat Technologies”, in which they analyzed the current situation and made some predictions for …

Top 10 botnets and their impact

Every day, approximately 89.5 billion unsolicited messages (i.e. spam) are sent by computers that have been compromised and are part of a botnet. Botnets – apart from …

Global IT-related risk framework

ISACA released Risk IT, the first global IT-related risk framework to provide a comprehensive view of the business risks associated with IT initiatives. Available as a free …

Top 15 most common security attacks

The latest in the Data Breach Investigations Report series by Verizon Business security experts provide a look at the 15 most common security attacks and how they typically …

FIFA World Cup related scams

It should be universally know by now that hot news and big events are almost always used by spammers, phishers and peddlers of scareware to reach the widest audience possible. …

Advances in surveillance, more attacks on the horizon

Slashed budgets and reduced staffing numbers delayed many security initiatives in 2009, but the vulnerabilities didn’t retreat and will only intensify in 2010, Unisys …

Fake fingerprint fools biometric devices

Japan saw its first case of biometric fraud come to light when they arrested Lin Rong, a 27-year old Chinese woman, on account of her faking a marriage to a Japanese man. BBC …

Microsoft releases six security bulletins

In today’s Patch Tuesday, Microsoft delivers 6 bulletins that fix vulnerabilities targeting Windows, Office and Internet Explorer. Jason Miller, Data and Security Team …

Don't miss

Cybersecurity news