Please turn on your JavaScript for this page to function normally.
Blazing fast password recovery with new ATI cards

ElcomSoft accelerates the recovery of Wi-Fi passwords and password-protected iPhone and iPod backups by using ATI video cards. The support of ATI Radeon 5000 series video …

New hosted email security platform from Trend Micro

Trend Micro introduced Hosted Email Security – based on a new platform – which will create a new mission-critical service standard for what small and large …

Splunk 4.0.10 released

Splunk released version 4.0.10 of the Splunk IT search and analysis engine. The following issues have been resolved in this release: As of Splunk version 4.0.10, summary index …

Vast online data leak in South Korea

South Korean retailer Shinsegae and 24 other companies have been breached and private data on 20 million customers has been stolen, forcing the Ministry of Public …

European banks lack document security

Financial services companies across Europe are unintentionally putting their confidential information at risk, according to research from Ricoh. At the heart of the issue is …

Brandjacking: Online brand abuse soars

Online brand abuse rose across major industries in 2009 according to the MarkMonitor Brandjacking Index. The report reveals the total number of phishing attacks was at an …

The rise of amateur-run botnets

It used to be that cyber criminals were people with a highly technical skill set, but this is not the norm anymore. This fact became obvious some two weeks ago when news of …

News of Corey Haim’s funeral lead to fake AV

Corey Haim’s death is old news by now, but fans of the prematurely deceased teen idol are still on the lookout for information concerning his death. Those interested in …

Rogue software details: Smart Security

Smart Security is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Collection of security checks for Linux

Buck Security is a collection of security checks for Linux. It was designed for Debian and Ubuntu servers, but can be useful for any Linux system. The aim of Buck Security is, …

Introducing the Cyber Defence conference

Cyber warfare has become a major concern for international governments, military and civil agencies over the past few years. A recent wave of cyber attacks against NATO member …

Week in review: Compromised hardware, AV failures and published IE 0-day exploit

Here’s an overview of some of last week’s most interesting news, articles and interviews: Zuckerberg hacked into journalists’ email? The Facebook co-founder …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools