Please turn on your JavaScript for this page to function normally.
New book: “Netbooks: The Missing Manual”

Netbooks are the hot new thing in PCs – small, inexpensive laptops designed for web browsing, email, and working with web-based programs. But chances are you don’t …

Video: Preview of the new Nessus client interface

In the video below you get a sneak peak at the next evolution of the NessusClient, which is a flash-based application residing on the Nessus server and accessed via web …

Large-scale malvertisement attack hits popular websites

Between Sep 19 and Sep 21, ScanSafe identified malicious banner ads served via multiple popular sites, including drudgereport.com, lyrics.com, horoscope.com and slacker.com. …

What does the government know about you?

It seems that one of the most paranoid suppositions regarding government control of regular citizens is partly true. Wired reports that they managed to procure declassified …

5 tips to protect your business from online banking fraud

Guardian Analytics’ CEO, Terry Austin, is advising businesses on the risks of Internet banking, and how they can protect their companies from becoming a victim of online …

Digital signatures for individuals and small office use

ARX announced CoSign Desktop, a digital signature solution designed specifically for individual and small office use. It provides software and a free digital certificate, …

How did PC users protect themselves against viruses ten years ago?

Avira surveyed 5,543 international web surfers to find out how they dealt with the issue of IT security ten years ago, when the number of computer attacks rose sharply. The …

Real-time traffic intelligence and security of large IP networks

Narus announced a new release of NarusInsight, its real-time traffic intelligence system. This latest version introduces customizable monitoring capabilities, powerful …

Sophos Free Encryption

Sophos Free Encryption lets you secure your data easily and quickly without any central infrastructure in place. Individuals and businesses alike can easily protect selected …

Forensic toolkit delivers speed, analytics and scalability

AccessData announced the release of version 3 of Forensic Toolkit, a solution that delivers enhanced analytics, remote device acquisition and expanded reporting options. GUI …

Video: How to steal a botnet

Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A …

Desktop virtualization and security survey

Imprivata conducted a national survey targeting executives across a wide array of industries (including healthcare, financial services, state and local governments agencies) …

Don't miss

Cybersecurity news