Please turn on your JavaScript for this page to function normally.
Micello starts where Google maps stop

Want to know which way to go when you find yourself looking for a specific room in a college campus or a particular shop in a mall? Yes, I know – you could just ask …

Department of Homeland Security in search of 1,000 cyber security experts

Apparently, the Department of Homeland Security will be starting filling up a lot of empty positions very soon. Janet Napolitano, the Department’s Secretary, made it …

Open source privacy enhancer BleachBit 0.6.5 released

BleachBit frees disk space, removes hidden junk, and guards your privacy. Erase cache, delete cookies, clear Internet history, remove unused localizations, shred logs, and …

Video: Tools for exploiting Web applications

In the video below, the authors of the Samurai Web Testing Framework talk about injectable exploits which focus on the exploitation of major web flaws during penetration …

VeriSign’s strong authentication now available on new devices

VeriSign’s latest release of VIP Access for Mobile is now available for Apple iPod touch, additional BlackBerry smartphones, and devices running the Windows Mobile …

New book: “The Art of Community”

Online communities offer a wide range of opportunities today, whether you’re supporting a cause, marketing a product or service, or developing open source software. The …

Full disk encryption activated by USB

LIGATT Security announced Locked Up, an encryption tool that acts like a vault for a computer, storing data securely. Using full disk encryption, Locked Up prevents all …

OpenSSH 5.3 released

OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. It encrypts all traffic (including passwords) to …

AT&T acquires VeriSign’s global security consulting business

AT&T announced the acquisition of VeriSign’s global security consulting business in a transaction that closed today. Terms of the deal were not disclosed. The …

Wireless network sees through walls

According to Technology Review, it is now possible to see through walls using a wireless network. Neal Patwari and Joey Wilson, two researchers at the University of Utah …

Social media continue to attract criminals

F-Secure today released its Third Quarter 2009 Security Threat Summary. One of the notable trends during the quarter was a shift to leaner and more secure operating systems. …

Most networks unprepared for attack response

Solera Networks released the results of a survey on network forensics which found that an overwhelming number of companies have recently experienced or expect to experience a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools