Please turn on your JavaScript for this page to function normally.
Web 2.0 Architectures

What is Web 2.0? There is still no definitive and all-encompassing definition for the phenomenon, and there probably never will be. One thing that is known for sure is that it …

The Bento Book: Beauty and Simplicity in Digital Organization

Bento is a database for people who need more than a spreadsheet, but less than a full-fledged complex database. It was designed with Mac users in mind, and integrates Mail, …

GFI Network Security and PCI Compliance Power Tools

GFI LANguard is one of the most deservedly popular commercial network security tools there is. It's an administrator's dream software, a "3 for 1 deal" - it finds, assess and …

Googling Security: How Much Does Google Know About You?

Have you ever thought about the price you pay for using Google's services? They say it's all for free, but you're actually paying for it by allowing them to collect personal …

97 Things Every Software Architect Should Know

Don't we all sometimes wish we could just TAKE good advice, instead of thinking we have found a better way and make the mistakes we've been warned about? This book is a …

Cyber Crime Fighters: Tales from the Trenches

Every new technology has the capacity to be used for good or for evil. And where is a new way to commit crimes, criminals will find it. That being said, this book covers the …

Head First Networking

This book is really good example of why you shouldn't judge a book by it's cover. If you flip through it (and you're not acquainted with O'Reilly's "Head First" series), the …

The Google Way: How One Company is Revolutionizing Management As We Know It

You heard of Google, right? I'm joking of course. During the past ten years, Google has evolved from a small startup to one of the pillars of the modern day Internet. We are …

iPhone security software: iVault pro

Password and data managers are the most common iPhone security applications. The device is getting more and more users and they want to have secure data on the go. While …

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet

While flying to security events around the globe, I stock myself with a couple of The Economist issues which are meant to last until the connecting flight to the next …

iPhone security software: Notes+

Notes+ is rather a simple utility - its main function is to be used as a note taking utility with a twist. The twist in this situation is a security lock which can be turned …

Trend Smart Surfing for iPhone and iPod touch

Trend Micro recently launched "Trend Smart Surfing", a freeware iPhone application that provides URL reputation checks for iPhone users browsing the Web.

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools