Please turn on your JavaScript for this page to function normally.
Proper backup procedures can save you in case of a disaster

Natural disasters such as earthquakes, hurricanes, tornados, fires and flooding can cause extreme damage to homes and businesses in affected areas. While physical damage to …

Wireshark 1.2.1 released

Wireshark is the world’s most popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following vulnerabilities have …

Links to Erin Andrews peephole video infect PC and Mac users

Sophos is warning all internet users to be wary of websites claiming to host a controversial nude video of high-profile ESPN reporter Erin Andrews – hackers are using …

Experts predict more mobile Trojan slip-ups on the way

As news that the Symbian Foundation has admitted it needs better safeguards to prevent malicious apps finding their way onto mobiles, Fortify Software predicts this problem is …

New book: “Version Control with Git”

Created by Linus Torvalds to manage development of the Linux kernel, Git has become the principal tool for distributed version control. Git permits an infinite variety of …

Log management solution that addresses demand for regulatory compliance

Q1 Labs unveiled QRadar Log Manager, the growing company’s next-generation log management solution that provides users with total automation, thousands of reports, and …

nexTier Networks brings document DNA analysis to data loss prevention

nexTier Networks announced new DLP products designed to help SMBs mitigate data security risks. The new Compliance Enforcer 100 and 200 appliances leverage nexTier’s DLP …

Microsoft releases Office 2008 for Mac Service Pack 2

Microsoft Office 2008 for Mac Service Pack 2 (SP2) was released today. This midcycle free update is designed to improve speed, stability and compatibility. SP2 delivers highly …

Mobile security encryption solutions from PGP

PGP announced two new mobile security encryption solutions, PGP Portable and PGP Mobile 9.10, designed to address the challenges facing organizations that share portable data …

WordPress 2.8.2 fixes XSS vulnerability

WordPress 2.8.2 fixes an XSS vulnerability. Comment author URLs were not fully sanitized when displayed in the admin. This could be exploited to redirect you away from the …

Device control and endpoint security for Mac users

CoSoSys released My Endpoint Protector for Mac. This device control and data loss prevention service for Mac users and network administrators offers the ability to proactively …

New book: “Automating System Administration with Perl”

If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System …

Don't miss

Cybersecurity news