Hot Summer Book Giveaway
This giveaway is made possible by the fine folks at Addison-Wesley Professional and Cisco Press. We are giving away one copy of each of these books: To try your luck send an …
New book “Virtual Honeypots: From Botnet Tracking to Intrusion Detection”
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, …
HTTPS/SSL content filtering for SMB and education
Cymphonix announced the upcoming availability of Network Composer Version 8, the latest release of its award-winning secure web gateway appliance. The latest firmware …
DNS forgery pharming attack information
Trusteer announced today that its CTO and security researcher Amit Klein has cracked BIND’s random number generator and demonstrated a new attack affecting most Internet …
A study into corporate end user awareness of Web threats
Trend Micro announced the results of its study into corporate end users’ awareness of Web threats. The study tracked responses from 1600 corporate computer end users …
AT&T offers new security alerting and notification service
AT&T Inc. recently announced the availability of My Internet Protect, a security knowledge mining, alerting and notification service for identified threats that enter a …
SAIC addresses possible data compromise
Personal information of certain uniformed service members, family members and others was placed at risk for potential compromise while being processed by SAIC under several …
Video: Exploiting the iPhone
This is the demonstration of an iPhone exploit developed by the software security group at Independent Security Evaluators.
New Excel spam hits the airwaves
Microsoft Excel is the newest packaging spammers have created for their stock pump-and-dump scams, Commtouch reported today, based on the Company’s analysis of billions …
Microsoft Excel virus and a ransomware trojan
It is very easy to know when Pahooka.A has infected a computer. Once run, it replaces the computer’s desktop wallpaper with a multicolored star on a blue background and …
Peer-to-peer software leaks confidential police data
IT security and control firm Sophos is reminding companies of the importance of enforcing stringent IT security policies after it was revealed that a Japanese policeman has …
Data protection made better with Encryptionizer
NetLib announced the availability of the company’s next release of its flagship product, NetLib Encryptionizer. The company’s enhanced data encryption solution …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated