Please turn on your JavaScript for this page to function normally.
Spammers use social engineering to customize messages to potential victims’ location

Computer users around the world should be on their guard against a widespread, malicious spam campaign that poses as breaking news stories about a bomb blast in your city. …

Security that follows shared information no matter where it goes

Delivered in a Software-as-a-Service (SaaS) model, Egress Switch allows organizations to wrap controls around the information they share and ensures that data is not …

iTunes 8.1 fixes two vulnerabilities

Apple updated iTunes to version 8.1 and in the process addressed two vulnerabilities outlined below. Sending a maliciously crafted DAAP message may lead to a denial of service …

Video: Making money on the Web the black hat way

Below you can watch a presentation by Jeremiah Grossman, the founder and CTO of WhiteHat Security, and Trey Ford, the Director of Solutions Architecture at WhiteHat Security. …

New enterprise flash-powered servers from Sun

Sun Microsystems announced the availability of robust solid state drive (SSD) Flash technology in its x64, chip multi-threaded (CMT) Rack and Blade systems. Sun’s x64 …

U.S. college students want technology skills to compete for jobs

Amid concerns that the economic downturn could impact their career plans, eight in 10 U.S. college students see a growing need for more IT professionals as technology …

Protect enterprise data with default-deny protection

Rather than permit executable computer files to install themselves unless they appear on a blacklist, Comodo’s Endpoint Security Manager protects enterprise data on a …

Open networking solution now with SSL-based OpenVPN and IPS

Routing and security software Vyatta Community Edition reached version 5. VC5 greatly expands Vyatta’s security feature set, adding SSL-based OpenVPN, intrusion …

Opera Turbo now available for testing

Opera Turbo is a server-side optimization and compression technology that provides significant improvements in browsing speeds over limited-bandwidth connections by …

Army database compromised

The Army recently discovered a potential penetration of soldier information that occurred on a password-protected, secure web-based database of almost 1600 soldiers. As a …

New book: “The Art of Application Performance Testing”

Businesses in today’s world live and die by the performance of mission-critical software applications Sadly, many applications are deployed without being adequately …

Call for papers: International Conference on Digital Forensics and Cyber Crime

The International Conference on Digital Forensics and Cyber Crime is now accepting papers. Authors are invited to submit original and unpublished papers, accepted papers will …

Don't miss

Cybersecurity news