Should the U.S. government control the Internet?
Following the recent introduction in the Senate of bills that (if passed) would allow the U.S. president to shut down the Internet in case of a cyber emergency, a lot of …
Software-based threat detection solution
Guidance Software announced EnCase Cybersecurity, designed for information security, network defense and incident response teams who are tasked with protecting sensitive or …
Obama appoints copyright czar
According to Wired, President Obama appointed on Friday the first “copyright czar” in U.S. history. Her name is Victoria Espinel, and the official job title is …
Video: OWASP top 10 security vulnerabilities
Below you can watch two videos with a talk on OWASP top 10 security vulnerabilities, given by Barry Dorrans at the UK Vista Squad user group meeting in London. Update …
Businesses risk data loss as backup is overlooked
Small and medium enterprises (SMEs) are putting data at risk according to recent research by Buffalo Technology. Worrying results indicate that data backup is being ignored …
New book: “Programming Cocoa with Ruby”
Programming Cocoa with Ruby brings together two enthusiastic development communities. Ruby programmers will tell you how productive they are with just the right amount of …
Video: Anti-malware testing
Rik Ferguson from Trend Micro talks about a new third party anti-malware testing methodology that better reflects today’s real-world conditions.
Process Hacker 1.5 released
Process Hacker is a free and open source process viewer and memory editor with unique features such as powerful process termination and a Regex memory searcher. It can show …
Ants vs. worms: Computer security mimics nature
In the never-ending battle to protect computer networks from intruders, security experts are deploying a new defense modeled after one of nature’s hardiest creatures …
Cain & Abel 4.9.32 released
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
Is malware overwhelming the Internet?
It seems that the Universe (or life) must follow a strict set of rules. One of them concerns good things and says: “There’s always a few people who spoil it for …
Futronic launches FS50 two finger scanner
Futronic unveiled the FS50, a portable fingerprint scanner with 1.6 x 1.5 inch (40.64 x 38.10 mm) scanning area. Its advanced optical system can capture 800 x 750 pixels and …
Featured news
Resources
Don't miss
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform
- AI made crypto scams far more dangerous