Micello starts where Google maps stop
Want to know which way to go when you find yourself looking for a specific room in a college campus or a particular shop in a mall? Yes, I know – you could just ask …
Department of Homeland Security in search of 1,000 cyber security experts
Apparently, the Department of Homeland Security will be starting filling up a lot of empty positions very soon. Janet Napolitano, the Department’s Secretary, made it …
Open source privacy enhancer BleachBit 0.6.5 released
BleachBit frees disk space, removes hidden junk, and guards your privacy. Erase cache, delete cookies, clear Internet history, remove unused localizations, shred logs, and …
Video: Tools for exploiting Web applications
In the video below, the authors of the Samurai Web Testing Framework talk about injectable exploits which focus on the exploitation of major web flaws during penetration …
VeriSign’s strong authentication now available on new devices
VeriSign’s latest release of VIP Access for Mobile is now available for Apple iPod touch, additional BlackBerry smartphones, and devices running the Windows Mobile …
New book: “The Art of Community”
Online communities offer a wide range of opportunities today, whether you’re supporting a cause, marketing a product or service, or developing open source software. The …
Full disk encryption activated by USB
LIGATT Security announced Locked Up, an encryption tool that acts like a vault for a computer, storing data securely. Using full disk encryption, Locked Up prevents all …
OpenSSH 5.3 released
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. It encrypts all traffic (including passwords) to …
AT&T acquires VeriSign’s global security consulting business
AT&T announced the acquisition of VeriSign’s global security consulting business in a transaction that closed today. Terms of the deal were not disclosed. The …
Wireless network sees through walls
According to Technology Review, it is now possible to see through walls using a wireless network. Neal Patwari and Joey Wilson, two researchers at the University of Utah …
Social media continue to attract criminals
F-Secure today released its Third Quarter 2009 Security Threat Summary. One of the notable trends during the quarter was a shift to leaner and more secure operating systems. …
Most networks unprepared for attack response
Solera Networks released the results of a survey on network forensics which found that an overwhelming number of companies have recently experienced or expect to experience a …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted