Please turn on your JavaScript for this page to function normally.
Reversible watermarking proves digital image authenticity

Knowing whether a digital photo has been altered is sometimes of vital importance. Being able to confirm that the picture is authentic and that it, indeed, comes from the …

Black Hat USA 2010 presents over 30 new vulnerabilities

Black Hat USA 2010, taking place later this month in Las Vegas, will spotlight new vulnerabilities, tools, programs and big names, including a Cyber War discussion by General …

Phone-based authentication for IBM Tivoli Access Manager

PhoneFactor has added support for IBM Tivoli Access Manager to its suite of authentication solutions and can now seamlessly enable phone-based two-factor authentication to …

The Pirate Bay hacked, user information exposed

It’s one problem after another for the (in)famous file-sharing Web site. Dogged by the music and movie industry, its founders are defending themselves and their creation …

Manhunt for murderer prompts poisoned image search results

Six days ago, an Englishman named Raoul Moat shot his ex-girlfriend, her new boyfriend and a police officer. The UK police has instigated a manhunt that has, so far, failed to …

Fake car tax adjustment information leads to malware

A wave of spam emails containing a malicious attachment is targeting car owners. The subject line professes the email to be a heads-up about changes regarding the tax one must …

Web safety score checklist

Are you sure your most sensitive financial and personal information is safe when you’re banking or shopping online? The Web Safety Score checklist by SafeCentral helps …

Community support for Tavis Ormandy, security researcher

The highly-publicized disclosure of a 0-day Microsoft vulnerability by Tavis Ormandy has divided security researchers. While some deem his action irresponsible, others support …

Critical infrastructure security booming in the EU

New analysis from Frost & Sullivan finds that market growth is fueled by government funds and private investments. EU security regulation compliance requirements and the …

Cloud-based security through Amazon Web Services

Sourcefire is delivering cloud-based Intrusion Prevention services, based on its open source Snort technology. Snort and Sourcefire Vulnerability Research Team (VRT) rules are …

ElcomSoft breaks passwords faster with NVIDIA Fermi based accelerators

ElcomSoft announced the support of NVIDIA Fermi chips for accelerating password recovery even further. By using NVIDIA’s newest high-end video accelerators for its …

Privacy breach detection package for healthcare providers

FairWarning released the HITECH Privacy Essentials, a bundled package for privacy breach detection designed for rapid deployment and compliance among healthcare providers. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools