Please turn on your JavaScript for this page to function normally.
Botnet C&C centers move to social networks

In the last year or so, we have witnessed many botnet command and control centers being taken down in organized actions instigated or aided by companies such as Microsoft, …

TrueCrypt 7.0 released

TrueCrypt 7.0 has been released. Among the new features are hardware-accelerated AES, support for devices that use sector sizes other than 512 bytes, ability to configure a …

New zero-day “shortcut worm” vulnerability affects all Windows versions

Microsoft published Security Advisory 2286198 on Friday of last week, confirming the existence of a critical vulnerability in all supported versions of Windows. The new …

iTunes 9.2.1 fixes critical hole

iTunes 9.2.1 comes with improvements and a security fix. A buffer overflow exists in the handling of “itpc:” URLs. Accessing a maliciously crafted …

A holistic approach to managing risk

McAfee unveiled a risk management solution for IT security that combines real-time threat intelligence with global vulnerability scanning across applications, databases and …

Fully itegrated e-mail and web cloud security service

Zscaler announced the worldwide availability of a fully integrated e-mail and web security service. Key features include: Accurate filtering to block spam and phishing Deep …

SOURCE Barcelona 2010 speaker line-up

SOURCE Conference brings computer and IT security professionals and practitioners together in a unique environment to discuss the security industry’s most important …

Splunk 4.1.1 brings 90+ fixes

Splunk provides the ability for users to search, monitor and analyze live streaming IT data as well as terabytes of historical data, all from the same interface. The following …

Identifying suspicious URLs

This video explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated …

Hacker fingerprints – the future of malware detection?

It has been obvious for a time now that security companies will have to find a new malware detection technique that will complement their heuristic engines searching for …

Skimming devices on gas pumps sending stolen card numbers via Bluetooth

A maintenance worker at a Shell gas station located in Florida was the first one to notice that a gas pump he was checking had been fitted with a credit card skimming device. …

Emerging threats in the end user environment

New social networking technologies, mobile devices and a more flexible and tech-savvy workforce are leading to increasingly complex and diverse end user environments with many …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools