Please turn on your JavaScript for this page to function normally.
Secure encrypted ruggedized mobile hard drive

Rocstore announced its new line of Rocsecure Commander 2 encrypted external hard drives. The first of its kind in ruggedized design, the Commander 2 series pocket drives are …

25 million new malware strains in one year

The outstanding trend of the last 12 months has been the prolific production of new malware: 25 million new strains were created in just one year, compared to a combined total …

Twitter and Google account vulnerabilities

Nir Goldshlager, a security researcher and penetration tester, discovered some XSS vulnerabilities in Twitter and Google Calendar that can be exploited by attackers to steal …

Criminal found through World of Warcraft

It seems that law enforcement agencies are getting more creative with ways of leveraging dug up information about wanted criminals. Using the knowledge of a previously …

iPhone network sniffer

Pirni is the worlds first native network sniffer for iPhone. The iPhone’s Wi-Fi has some major drawbacks in its hardware design, thus we can not properly set the device …

F-Secure protects smartphone data

F-Secure released its new standalone smartphone solution, Anti-Theft for Mobile which provides three useful security features to protect your phone: remote lock, remote wipe …

Automatic analysis of malware behavior

Malheur is a tool for automatic analysis of program behavior recorded from malware. It has been designed to support the regular analysis of malicious software and the …

File-scanning services for malware writers

A lot of people are aware of and are using online file-scanning services when they want to check if a suspicious file they got as an attachment or have found on their computer …

Rogue software details: SpyEraser

SpyEraser is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Privacy issues of data collecting

Will 2010 see the beginning of a change in regulations regarding net privacy? It’s hard to tell. The issue has been a matter for dispute for quite some time now, but …

Classification of weaknesses and attacks

The Web Application Security Consortium (WASC) released Threat Classification 2.0. The Threat Classification is an effort to classify the weaknesses, and attacks that can lead …

2010: A good year for fighting cybercrime?

McAfee Labs believes cybercriminals will target social networking sites and third-party applications, use more complex Trojans and botnets to build and execute attacks, and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools