Please turn on your JavaScript for this page to function normally.
Intel launches its most secure data center processor

Combining security, performance and energy efficiency, Intel launched the Intel Xeon Processor 5600 series which deliver two new security features — Intel Advanced …

Six common virtualization security risks and how to combat them

Through 2012, 60 percent of virtualized servers will be less secure than the physical servers they replace, according to Gartner. Although they expect this figure to fall to …

Implement the SSH-2 protocol in pure Java

Ganymed SSH-2 for Java is a library which implements the SSH-2 protocol in pure Java (tested on J2SE 1.4.2 and 5.0). It allows one to connect to SSH servers from within Java …

The smart grid, it’s all about security

All too often you read about security breaches that cost firms millions of dollars or hit individuals with loss of personal data or both. But all this pales in comparison when …

Blazing fast password recovery with new ATI cards

ElcomSoft accelerates the recovery of Wi-Fi passwords and password-protected iPhone and iPod backups by using ATI video cards. The support of ATI Radeon 5000 series video …

New hosted email security platform from Trend Micro

Trend Micro introduced Hosted Email Security – based on a new platform – which will create a new mission-critical service standard for what small and large …

Splunk 4.0.10 released

Splunk released version 4.0.10 of the Splunk IT search and analysis engine. The following issues have been resolved in this release: As of Splunk version 4.0.10, summary index …

European banks lack document security

Financial services companies across Europe are unintentionally putting their confidential information at risk, according to research from Ricoh. At the heart of the issue is …

Brandjacking: Online brand abuse soars

Online brand abuse rose across major industries in 2009 according to the MarkMonitor Brandjacking Index. The report reveals the total number of phishing attacks was at an …

Rogue software details: Smart Security

Smart Security is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Does Web 2.0 need Web security 2.0?

Web 2.0 is thriving, and so too are applications that take advantage of this technology. Interactive sites like LinkedIn, Twitter and even company websites are becoming ever …

Collection of security checks for Linux

Buck Security is a collection of security checks for Linux. It was designed for Debian and Ubuntu servers, but can be useful for any Linux system. The aim of Buck Security is, …

Don't miss

Cybersecurity news