Please turn on your JavaScript for this page to function normally.
Symantec introduces Norton Internet Security and AntiVirus 2010

Symantec announced Norton Internet Security 2010 and Norton AntiVirus 2010, with a new model of security, codenamed Quorum, to attain detection of new malware beyond …

Firefox 3.5.3 fixes critical security vulnerabilities

Mozilla released Firefox 3.5.3 that fixes several security issues. Crashes with evidence of memory corruption Mozilla developers and community members identified and fixed …

Nullcon Goa 2010 opens Call for Papers

The next edition of Nullcon is taking plance in Goa, India, in February 2010. The conference will run on the following two serial tracks: 1. Gurukul Track – 1 hr …

Detecting Twitter spam and threats

David Maynor, over at Errata Security’s blog explains how he got fooled by a spambot. Using their TwiGUARD analysis tool, he discovered a profile that to him seemed …

The most dangerous computer threats of the last 20 years

PandaLabs has issued a ranking of the most insidious malware threats that have surfaced in the past 20 years. The following threats have been selected for the notoriety they …

JScript scripting engine critical vulnerability

Microsoft released a security update that resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a …

fwknop 1.9.12 released

fwknop stands for the “FireWall KNock OPerator”, and implements an authorization scheme called Single Packet Authorization (SPA). This method of authorization is …

Real-time alerting and advanced mapping capabilities for host level devices

Lumeta announced the latest release of IPsonar, a comprehensive network discovery and network mapping solution for large organizations. This latest release includes …

New backwards-compatible Intel Core 2 Quad PICMG 1.0 SBC

Portwell has launched its new ROBO-8779VG2A, an Intel Core 2 Quad/Core 2 Duo/ Celeron processor-based PICMG 1.0 SBC with DDR3 SDRAM, VGA, DVI, Dual Gigabit Ethernet, Audio and …

Time stamping security appliance from Thales

Thales announces version 5 of Thales Time Stamp Server, allowing customers to time stamp electronic records and application software with an even higher level of security and …

Aircrack-ng 1.0 released

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along …

Automated lock down for Red Hat Enterprise Linux on IBM’s System z

Trusted Computer Solutions announced that Security Blanket, the company’s automated lock down solution, is now available for Red Hat Enterprise Linux 5 operating systems …

Don't miss

Cybersecurity news