Please turn on your JavaScript for this page to function normally.
WordPress worm: upgrading is vital

WordPress warns that a worm has been making the rounds of the old versions of its platform. Blog writers who didn’t get around to upgrading their versions remained …

SaaS vulnerability scanning for internal networks

Comodo introduces vulnerability scanning for internal networks in the cloud with the newest release of its HackerGuardian. Previously, internal network scans required …

F-Secure Internet Security 2010 pre-installed on Nokia Booklet 3G

F-Secure and Nokia are extending their collaboration to include Internet security on computers. Owners of the Nokia Booklet 3G mini-laptop get a free 30-day trial version of …

The path to comprehensive ID management

There have been many changes since enterprises first looked at implementing smart card-based common access card programs in the 1990s. Although some large corporations …

Encrypted mobile phone calls from anywhere

Cellcrypt Mobile is now available over Inmarsat‘s broadband satellite services, enabling encrypted voice calls to be made on popular smartphones from anywhere for the …

OpenLR: Opens source dynamic location referencing technology

TomTom developed a dynamic location referencing technology as an open standard for the navigation, mapping and ITS Industry, called OpenLR. OpenLR has been designed for …

SCALE 8X Call For Papers now open

The 8th Annual Southern California Linux Expo scheduled for February 19-21 2010 is taking place at the Westin Hotel near Los Angeles International Airport. SCALE 8x will have …

Alarming increase in ATM crime

With the annual cost of ATM crime in Europe approaching half a billion Euros, ENISA, the European Network and Information Security Agency, is urging consumers to be more aware …

All-in-one software protection solution by Arxan

Arxan introduced the all-in-one Software Protection Solutions suite, designed to protect and respond to a variety of ISV application attacks, such as binary code modification, …

Simplified authentication solution from Thales

Thales announced SafeSign Single Sign On, the latest addition to the SafeSign strong authentication and ID management product line. SafeSign Single Sign On provides simplified …

Cybercriminals exploit California bush fires

Cybercriminals are not known for their high moral standards, so it comes as no surprise they are using people’s concern and interest regarding the California bush fires …

Workshop on Aggressive Computing and Security Call for Papers

In recent years, major security conferences preferred to select papers according to hot topics. As a result excellent yet unorthodox scientific papers are often rejected and …

Don't miss

Cybersecurity news