Help Net Security
VeriSign’s strong authentication now available on new devices
VeriSign’s latest release of VIP Access for Mobile is now available for Apple iPod touch, additional BlackBerry smartphones, and devices running the Windows Mobile …
New book: “The Art of Community”
Online communities offer a wide range of opportunities today, whether you’re supporting a cause, marketing a product or service, or developing open source software. The …
Full disk encryption activated by USB
LIGATT Security announced Locked Up, an encryption tool that acts like a vault for a computer, storing data securely. Using full disk encryption, Locked Up prevents all …
OpenSSH 5.3 released
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. It encrypts all traffic (including passwords) to …
AT&T acquires VeriSign’s global security consulting business
AT&T announced the acquisition of VeriSign’s global security consulting business in a transaction that closed today. Terms of the deal were not disclosed. The …
Social media continue to attract criminals
F-Secure today released its Third Quarter 2009 Security Threat Summary. One of the notable trends during the quarter was a shift to leaner and more secure operating systems. …
Most networks unprepared for attack response
Solera Networks released the results of a survey on network forensics which found that an overwhelming number of companies have recently experienced or expect to experience a …
SharePoint and MySQL cloud backup solution
Zmanda announced version 2 of its Zmanda Cloud Backup (ZCB) product, with new features such as cloud backup of MySQL and SharePoint, geography control, selective restore and …
GFI Software acquires Katharion
GFI Software has acquired hosted email filtering company Katharion and will be able to offer a hosted email filtering, anti-spam and anti-virus service later this quarter. …
IP retrieval solution for IP data compliance
CopperEye launched a new product that will allow communications operators to add IP data retention and retrieval capabilities to their existing systems. The IP Retrieval …
Data leakage plan of action
Tiny computing and storage devices have revolutionized the way people carry information as they can stow the equivalent of millions of pages of data. Yet this benefit is also …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)