Please turn on your JavaScript for this page to function normally.
Most companies block cloud services

While 80 percent of companies do not allow their employees to use cloud based file synchronization services, 70 percent of companies would use these services if they were as …

Oracle releases 87 security fixes

The Oracle Critical Patch Update (CPU) Advisory for July 2012 contains 87 security fixes for various products across their portfolio. This advisory is a bit of déjà vu …

Rapid password cracking using Pico FPGA-based hardware

ElcomSoft updated two password recovery tools, employing Pico FPGA-based hardware to greatly accelerate the recovery of passwords. Users of Elcomsoft Phone Password Breaker …

MPs call for cyber war on Britain’s cyber enemies

Britain’s security and intelligence agencies have been urged by MPs to engage in cyber attacks against enemy states in a report released by The Intelligence and Security …

Real-time IP address blocking of DDoS attacks

Corero Network Security is extending its capabilities with the launch of ReputationWatch. It will identify in real-time known malicious entities and block access to …

IPv6 and click fraud

The good news: To accommodate the ever-increasing demand for IP Addresses around the world, every network will eventually transition to IPv6 from IPv4. The bad news: Spammers …

Panda Cloud Antivirus 2.0 released

Panda Security launched Panda Cloud Antivirus 2.0 for both its Free and Pro editions. The new version is fully compatible with Windows 8 Release Preview and incorporates a new …

Send messages with file attachments in a secure environment

TigerText introduced the ability to send file attachments today through an API integration with Dropbox. TigerText users will now be able to securely and instantly send PDF, …

Sophos delivers complete security in a box

Sophos announced Sophos UTM 9, specifically designed to integrate gateway security and endpoint security in a single hardware or virtual box. It provides complete security …

Blue Coat delivers mobile application controls

Blue Coat introduced mobile application controls that close the security gap created by unsanctioned mobile applications on the corporate network. The growth in bring your own …

Check Point simplifies security for private clouds

Check Point introduced Check Point Virtual Systems, that allow customers to secure multiple network segments by selecting any combination of Check Point software blade …

Norman updates Malware Analyzer G2 platform

Norman announced the new version of its Malware Analyzer G2 platform which delivers to analysts the latest automated analysis tools. Malware Analyzer G2 Version 3 delivers: …

Don't miss

Cybersecurity news