Please turn on your JavaScript for this page to function normally.
Threat and spamscape report for May

AppRiver published their monthly report which highlights key spam and malware trends. We heard much less about the Conficker Worm this past month, although, some malware …

Windows 7 anti-piracy experience

Joe Williams, general manager, Worldwide Genuine Windows at Microsoft, outlined what the company has planned for anti-piracy features in Windows 7. The user’s experience …

Web 2.0 hacking incidents on the rise

The Secure Enterprise 2.0 Forum, an industry initiative dedicated to the secure use of social media at work, and WorkLight, a Secure Web 2.0 for Business Company, today …

Login Manager 6.0.1 released

Hitachi ID Systems released version 6.0.1 of the Hitachi ID Login Manager which takes a unique approach to single signon technology. It reduces login time by automatically …

Low-power Core 2 Duo network appliance with six Gigabit LANs

Axiomtek introduced the NA-812A 1U-height network appliance. Designed with green concept in mind, the NA-812A integrates a low power 45nm Intel Core 2 Duo processor up to 1.8 …

US missile launch data on eBay hard drive is a serious lapse in security procedures

Revelations about a hard drive purchased on eBay – which reportedly contained the launch procedures for a US military air defence system – is extremely worrying. …

IBM PR/SM z10 EC/BC evaluated at Common Criteria Certification at EAL 5

atsec information security completed the Common Criteria evaluation of IBM Processor Resource/System Manager (PR/SM) LPAR for IBM System z10 Business Class (z10 BC) and z10 …

Signature-based scanners miss 58% of malware

In its quarterly Global Threat Report issued today, ScanSafe reported that at its highest peak in Q109, 58% of Web malware blocks were zero day threats. On average, the rate …

Kaspersky Lab patents heuristic analysis technology

Kaspersky Lab patented a heuristic analysis technology in the US. The technology enables a security rating to be assigned to software based on its behavior during emulation. …

DeepSec 2009 call for papers

The third DeepSec In-Depth Security Conference will take place from November 17th to 20th at the Imperial Riding School Renaissance Hotel in Vienna. You can submit proposals …

Is your firewall a fire hazard?

Ask a firewall administrator to tidy up a rule base and get rid of every unused rule and object; or if you really want to make someone’s life miserable set them the task …

RSA simplifies use of encryption with new Key Manager Suite

RSA announced enhancements to RSA Key Manager Suite (RKM), its enterprise encryption key management system designed to manage encryption keys at the application, database, and …

Don't miss

Cybersecurity news