Cloud computing not as safe as they want you to think
Cloud computing has been touted as the perfect solution for our increasingly mobile life-style – everything we need is always online and always accessible. The …
Multi-purpose fuzzer zzuf
zzuf is a transparent application input fuzzer. Its purpose is to find bugs in applications by corrupting their user-contributed data (which more than often comes from …
Rogue software details: WiniFixer
WiniFixer is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
SecureCloud 2010: The future of cloud security
SecureCloud 2010 is a premier educational and networking event hosted by ENISA, the Cloud Security Alliance and ISACA, three of the leading organizations shaping the future of …
Week in review: critical IE security issues, cybercrime increase and Facebook risks
Here’s an overview of some of last week’s most interesting news and interviews: Blippy, a great service for phishers? Blippy, a new service that lets you twitter …
New Google Chrome security features
The latest release of Google Chrome has integrated five new security features that “make it easier for developers to build secure web sites,” writes Adam Barth, …
Congressional web sites defaced
Visitors of websites of some Congressional representatives and of a few committees were greeted on Wednesday evening by a short message with colorful language. The websites …
Top 5 online privacy tips
Increasingly sophisticated spam and an ever-changing array of new email-borne malware continue to have a huge impact on the growing levels of loss of sensitive and personal …
Ultra-secure USB flash drive from Kingston
Kingston released the DataTraveler 5000 USB Flash drive which is FIPS 140-2 Level 2 certified with Level 3 pending, and features 256-bit AES hardware-based encryption. The …
Critical IE security issues to be detailed at Black Hat DC 2010
At the Black Hat DC 2010 conference Core SCS Security Consultant Jorge Luis Alvarez Medina will demonstrate cutting-edge browser manipulation techniques that can allow for …
RSA Conference 2010 keynote lineup
RSA Conference 2010 announced its keynote speaker lineup for the March event in San Francisco. As interest continues to swirl around cloud computing and the popularity of …
The age of cyberwar
McAfee revealed the staggering cost and impact of cyberattacks on critical infrastructure such as electrical grids, oil and gas production, telecommunications and …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)