Please turn on your JavaScript for this page to function normally.
Cisco patches DoS flaws in IOS

Cisco has released a bundle of security updates for the IOS (the software used on Cisco Systems routers and current network switches) and the Unified Communications Manager …

Majority of U.S. federal domain names still don’t use DNSSEC

The majority of Federal agency run .gov domains are not signing their DNS with DNSSEC despite a December 2009 Federal deadline for adoption, according to an IID report. DNSSEC …

Lack of security measures still hinder cloud computing adoption

Demand for cloud computing systems clearly exists. However, better security, like multi-factor authentication and encryption, are going to be required if cloud computing …

Network access control system PacketFence 1.9.1 released

PacketFence is a free and open source network access control (NAC) system. It can be used to effectively secure networks – from small to very large heterogeneous …

Microsoft offers free AV to small businesses

In a well-calculated but also very positive move, Microsoft has announced that – beginning in early October – it will be offering its Microsoft Security Essentials …

No sexually explicit content in the office, please!

Symantec announced the publication of its September 2010 MessageLabs Intelligence Report, and the analysis reveals that 35 percent of remote and office-based workers who use …

All-in-one Wi-Fi cracking solution

ElcomSoft upgraded its Wireless Security Auditor and made it an all-in-one wireless cracking solution. It can automatically locate wireless networks, intercept data packets, …

The cookie that won’t go away

A proof-of-concept JavaScript API that manufactures persistent cookies and stores them in several types of storage mechanisms has been developed by security hacker Samy …

Software security testing – interest is high, security is low

In the past six months alone there have been multiple new zero-day vulnerabilities reported in Microsoft Windows and widely covered uneasiness about the security of mobile …

Theories about Stuxnet’s goal and authors abound

The quality of its code, the stolen certificates used to digitally sign it, the specifically targeted configuration, the four 0-day Windows vulnerabilities it exploits to …

Breakdown of security weaknesses by industry and organization size

WhiteHat Security released the tenth installment of its Security Website Security Statistics Report, providing a first-time breakdown of the state of website security by …

Trojan stealing private key certificates

As you may have already noticed, malware peddlers have realized that their wares have a greater chance of being loaded by the targeted system if they are digitally signed. The …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools