Security Lessons How hacking got easyOct 31, 2008
When it comes to security, public disclosure of vulnerabilities and working exploit code is now common. We look at why this can be both harmful and helpful to securing your systems.more »
A new article by Roel Schouwenberg, Senior Antivirus Researcher at the Kaspersky Lab, has drawn attention to the increased use of malware in cyber attacks on financial institutions.more »
Expert Security Intro Staying one step ahead of the intrudersMay 31, 2008
Internet intruders have many ingenious ways of escalating privileges and hiding their presence once they get inside your system. The best protection is to keep them out in the cold.more »
Development of the new version of the Gibraltar security software took more than a year. The release of Gibraltar 2.5 sees enhanced functionality and simplified use.more »
A joint survey performed by security experts from Infowatch and Russia's Securitylab points to the dangers that Instant Messengers (IM) can mean to enterprise communications structures.more »
A critical vulnerability has been discovered in the Rsync file synchronization tool.more »
A critical vulnerability has been discovered in the Opera Web browser.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems