Twitter plans to tighten security
Twitter announced it plans to hire 27 new people on jobs ranging from executive assistant to data analyst, software engineer to interaction designer. For a company as small as …
Eliminate vulnerabilities with source code analysis tool
CodePeer is a source code analysis tool that detects run-time and logic errors in Ada programs. Serving as an efficient and accurate code reviewer, CodePeer identifies …
Secret DNA database in danger of breach
The Children’s University hospital in Temple Street, Dublin, has been the target of a theft of two computer servers back in 2007. They contained medical records of …
Kismet 2009-11-R1 released
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) …
Fake Amazon email ships malware
The image of an open Amazon delivery box has a prominent place in the latest spam campaign that aims to trick users into downloading an alleged order update coming from the …
Rogue Android banking applications
Following a couple of announcements made in December by the likes of Travis Credit Union and First Tech Credit Union, a big brouhaha was raised about some mobile banking …
Scholarship for unemployed security pros at RSA Conference 2010
RSA Conference announced the return of a special scholarship program for unemployed information security practitioners. RSA Conference 2010 will award delegate passes to 25 …
BackTrack 4 Final released
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to …
Heartland to pay up to $60 million after data breach
Heartland Payment Systems and Visa announced a settlement agreement under which issuers of Visa-branded credit and debit cards will have an opportunity to obtain a recovery …
Date breaches: The insanity continues
In 2009, the Identity Theft Resource Center recorded 498 breaches, less than the 657 in 2008, more than the 446 in 2007. Are data breaches increasing or decreasing? That is …
How to use the JavaScript Blacklist Framework from Adobe
The video below shows you how to use the new JavaScript Blacklist Framework from Adobe to blacklist (vulnerable) API functions in JavaScript. For more information on PDF …
Self-encrypting disk drives for desktop and laptop computers
Mobile Armor announced the general availability of DriveArmor 3.0, a solution for access control and managing security on laptop and desktop computers with 2.5-inch …
Featured news
Resources
Don't miss
- Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
- AI is changing cybersecurity roles, and entry-level jobs are at risk
- From cleaners to creepers: The risk of mobile privilege escalation
- Researchers unearth keyloggers on Outlook login pages
- Hackers love events. Why aren’t more CISOs paying attention?