Please turn on your JavaScript for this page to function normally.
First dual biometric reader

ZK Software ntroduced the world’s first dual biometric reader. Just the touch of a finger, a one second facial scan or flash of an ID card is all it takes for the iFace …

Checklist to accelerate your software security efforts

In recent years, Software-as-a-Service (SaaS) has emerged as a viable application delivery method, and most enterprises are now including some SaaS software in their …

Symantec web security monitoring against pervasive threats

Symantec announced Web Security Monitoring, a new managed security service which monitors organizations’ proxy and gateway security devices for connections from hosts …

Turning point for security decision making

According to IBM and The Ponemon Institute research, 77 percent of C-level executives report that their organization has experienced a data breach at some point, while all …

The Conficker conundrum

Security experts estimate that Conficker, a particularly malicious worm, targeting MS Windows, has already infected more than 7 million computers around the world. Conficker …

Tax season: Identity thief’s paradise

Many consumers look forward to tax season in anticipation of a hefty return. In the same instance, many identity thieves look forward to tax season as well, only in …

Rogue software details: Coreguard Antivirus 2009

Coreguard Antivirus 2009 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Brazil tops global spam rankings

Brazil, India, Vietnam, USA and Russia head the ranking of countries from which most spam was sent during the first two months of the year, according to a study by Panda …

Best practices for web services interoperability

The Web Services Interoperability Organization (WS-I) announced the publication of the WS-I Basic Security Profile (BSP) 1.1 as final material for public access. WS-I is an …

AVG Rescue CD: Free toolset for repair of infected machines

The AVG Rescue CD is essentially a portable version of AVG Anti-Virus supplied through Linux distribution. It can be used in the form of a bootable CD or bootable USB flash …

Cloud computing: Risks outweigh the benefits

Research conducted across Europe, the Middle East and Africa (EMEA) by ISACA has found that a quarter of enterprises that already use cloud computing believe that the risks …

Rogue software details: PC Antispy

PC Antispy is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

Don't miss

Cybersecurity news