Please turn on your JavaScript for this page to function normally.
Hitachi ships 2TB hard drives with bulk data encryption

Hitachi is now shipping their enterprise-class, 7200 RPM 2TB offering, the Ultrastar A7K2000. This hard drive is designed, manufactured and tested to ensure …

Campaign Monitor attacked, accounts compromised

E-mail marketing service Campaign Monitor has been attacked and some accounts have been compromised. The company labeled this as a deliberate, planned and complex intrusion …

Video: Mitigating Web-based malware attacks

Over the past few years, malware spreading primarily by infecting web pages has been a significant emerging trend that has become so significant that the major search engines …

Portable smart card readers from SCM Microsystems

Smart cards are being used worldwide to secure identities in many applications, such as bank payment cards, employee access badges, government identity cards and healthcare …

Arch Linux 2009.08 released

Arch Linux is a lightweight and flexible Linux distribution. The 2009.08 snapshot images are now available. Changes since the 2009.02 release: built from a current snapshot of …

jCryption: Javascript HTML form encryption plugin

jCryption is a javascript HTML form encryption plugin, which encrypts the POST/GET-Data that will be sent when you submit a form. It uses the Multiple-precision and Barrett …

4-drive rack mounted NAS servers from Qnap

Qnap expanded their Turbo NAS lineup with a pair of NAS servers for the corporate and entry-level enterprise market. The new TS-439U-RP and TS-439U-SP models are both 4-drive …

12 tips to protect your identity at school

Schools are traditionally open and unprotected environments. Keeping your personal information secure is a critical responsibility. Losing that information can impact you the …

Protecting enterprises against Web application attacks with IBM

As threats and attacks increasingly target Web applications, many enterprises have been forced to take a reactive approach to security with point products that address only …

Malware beyond Vista and XP

Windows may be ubiquitous, but there’s a thriving variety of alternative operating systems for enterprise and home use. However, the alternatives aren’t as risk …

New book: “Natural Language Processing with Python”

Technologies based on Natural Language Processing, or NLP, are becoming increasingly widespread. In Natural Language Processing with Python, authors Steven Bird, Ewan Klein, …

Twitter security move positive but is it it enough?

Twitter has quietly started checking URLs entered into user messages on its microblogging service. The new level of security might still leave room for improvement on several …

Don't miss

Cybersecurity news