Spammers use social engineering to customize messages to potential victims’ location
Computer users around the world should be on their guard against a widespread, malicious spam campaign that poses as breaking news stories about a bomb blast in your city. …
Security that follows shared information no matter where it goes
Delivered in a Software-as-a-Service (SaaS) model, Egress Switch allows organizations to wrap controls around the information they share and ensures that data is not …
iTunes 8.1 fixes two vulnerabilities
Apple updated iTunes to version 8.1 and in the process addressed two vulnerabilities outlined below. Sending a maliciously crafted DAAP message may lead to a denial of service …
Video: Making money on the Web the black hat way
Below you can watch a presentation by Jeremiah Grossman, the founder and CTO of WhiteHat Security, and Trey Ford, the Director of Solutions Architecture at WhiteHat Security. …
New enterprise flash-powered servers from Sun
Sun Microsystems announced the availability of robust solid state drive (SSD) Flash technology in its x64, chip multi-threaded (CMT) Rack and Blade systems. Sun’s x64 …
U.S. college students want technology skills to compete for jobs
Amid concerns that the economic downturn could impact their career plans, eight in 10 U.S. college students see a growing need for more IT professionals as technology …
Protect enterprise data with default-deny protection
Rather than permit executable computer files to install themselves unless they appear on a blacklist, Comodo’s Endpoint Security Manager protects enterprise data on a …
Open networking solution now with SSL-based OpenVPN and IPS
Routing and security software Vyatta Community Edition reached version 5. VC5 greatly expands Vyatta’s security feature set, adding SSL-based OpenVPN, intrusion …
Opera Turbo now available for testing
Opera Turbo is a server-side optimization and compression technology that provides significant improvements in browsing speeds over limited-bandwidth connections by …
Army database compromised
The Army recently discovered a potential penetration of soldier information that occurred on a password-protected, secure web-based database of almost 1600 soldiers. As a …
New book: “The Art of Application Performance Testing”
Businesses in today’s world live and die by the performance of mission-critical software applications Sadly, many applications are deployed without being adequately …
Call for papers: International Conference on Digital Forensics and Cyber Crime
The International Conference on Digital Forensics and Cyber Crime is now accepting papers. Authors are invited to submit original and unpublished papers, accepted papers will …
Featured news
Sponsored
Don't miss
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)
- Debunking compliance myths in the digital era
- How CISOs tackle business payment fraud
- AI framework vulnerability is being used to compromise enterprise servers (CVE-2023-48022)
- Attackers leverage weaponized iMessages, new phishing-as-a-service platform