Please turn on your JavaScript for this page to function normally.
Securing the Borderless Network: Security for the Web 2.0 World

The future of the Web is mobile, virtualized, and collaborative. Among all the positive aspects and advantages that these changes will bring, there will also be some problems …

Mozy online backup service

Mozy (mozy.com) is an online/cloud backup service for consumers and small businesses. Read on to see how it performs.

Keynesis Lockngo Professional 4.0

Keynesis Lockngo is a portable application that encrypts and hides your portable drive on Windows AND Mac without any installation. The only thing required to activate the …

Inside Cyber Warfare: Mapping the Cyber Underworld

The latest attacks and intrusions on networks of US companies and the speculation about their origins have surely made cyber war a distinctly possible reality in the minds of …

Hacking: The Next Generation

We have all been witnessing new kinds of attacks emerging thanks to new technologies and ways of using our computers and networks. The use of social media, an increasingly …

Insidious: How trusted employees steal millions and why it’s so hard for banks to stop them

Why do employees steal? As you will see in the book, it is a combination of motivation, opportunity and attitude. But it is all underlined by the issue of trust, which is …

iPhone security software: Keeper Password & Data Vault

Keeper is yet another password management system for the iPhone platform. I tested the 3.2 version, released in late September 2009. The application requires around 5.4 MB for …

Espionage 2.5.4

Espionage is a discreet tool that integrates seamlessly with Apple's Finder, and its main "reason of being" is to protect individual folders and applications by encrypting its …

Beautiful Security: Leading Security Experts Explain How They Think

In Beautiful Security, a bevy of experts describe how they look at a particular aspect of information security. They offer the knowledge they have acquired through many years …

DigitalPersona Personal Premium

Since 1996, DigitalPersona delivers products that enable commercial enterprises, hardware OEMs, software ISVs and consumers to use fingerprint biometrics to secure their …

IronKey Personal

Military-grade hardware encryption safeguards your personal files while stealth Web browsing, anti-malware and password management protect your privacy and prevent identity …

SQL Injection Attacks and Defense

SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It occurs when user input is either …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools