Please turn on your JavaScript for this page to function normally.
Adobe patches Reader and Acrobat

Critical vulnerabilities have been identified in Adobe Reader 9.3.2 (and earlier versions) for Windows, Macintosh and UNIX, Adobe Acrobat 9.3.2 (and earlier versions) for …

A toolkit to simplify network management

Ipswitch released the WhatsUp Gold Engineer’s Toolkit, available as a free download for a limited time. The toolkit which helps monitor, diagnose and troubleshoot a vast …

Elaborate Identity theft scheme targets a million consumers

A federal court has halted an elaborate international scheme that used identity theft to place more than $10 million in bogus charges on consumers’ credit and debit …

World’s first 3 terabyte external desktop drive

Seagate announced the world’s first 3 Terabyte (TB) external desktop drive. Available immediately, the 3TB FreeAgent GoFlex Desk external hard drive which can store up …

Honeypot software for VoIP networks

Artemisa is an open source VoIP/SIP-specific honeypot software designed to connect to a VoIP enterprise domain as a user-agent backend in order to detect malicious activity at …

Web protection from the cloud

McAfee released SaaS Web Protection. The new Software-as-a-Service (SaaS) Web security solution combines the reporting capabilities and features from McAfee solutions with the …

Sentrigo expands Repscan with DB2 and MySQL support

Sentrigo released version 3.5 of Repscan, the vulnerability assessment and security scanning solution that now supports all of the most widely deployed DMBS platforms …

Protection for the Android platform

F-Secure Mobile Security 6 on the Android platform has been released. It provides security for smartphones against malicious software and also safeguards confidential data …

IEEE delivers critical 1815 DNP3 standard

IEEE announced the ratification of its IEEE 1815 Distributed Network Protocol (DNP3) standard for electric power systems communications. The new standard, which improves …

Five steps to cybersecurity risk assessment

Organizations face a constant barrage of cybersecurity threats. Botnets, malware, worms and hacking are just a few things that keep IT managers awake at night, wondering if …

Parallels Server for Mac 4 released

Recently released, Parallels Server for Mac 4 is optimized for Mac OS X server bringing reliability and scale to Apple environments. It consolidates multiple operating systems …

Erasing sensitive information from smartphones

Smartphone sales are up almost 57% this year over 2009, and sales are predicted to surpass worldwide PC sales by the end of 2011. With increasingly faster mobile networks, …

Don't miss

Cybersecurity news