Please turn on your JavaScript for this page to function normally.
Security experts define new priorities for security standardization

Standardization of security aspects of Information and Communication Technologies (ICT) continues to be a topic that needs careful balance, according the findings of the …

10 Gb intelligent bypass introduced by Interface Masters

Interface Masters Technologies unveiled the Niagara 2812 whose state-of-the-art active bypass capabilities ensure maximum uptime on any network-critical link. During normal …

What the Heartland Data Breach Tells Us

The recent data breach at Heartland Payment Systems should make one thing clear: the standards for security around credit card numbers still aren’t good enough. New …

Damn Vulnerable Linux 1.5 is now available

Damn Vulnerable Linux (DVL) is meant to be used by both novice and professional security personnel and is even ideal for the Linux uninitiated. You can start learning IT …

Only 8.4% of email that reached companies in 2008 was non-malicious

PandaLabs revealed the results from its analysis on 430 million email messages from 2008 and discovered that only 8.4 percent of messages that reached companies were …

PayPal joins OpenID foundation board

The OpenID Foundation announced the addition of PayPal as a sustaining corporate member of the board. PayPal selected Andrew Nash, Sr. Director of Information Risk Management …

New version of iServices Trojan now in pirated Adobe Photoshop CS4

Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse, OSX.Trojan.iServices.B, like the …

Code Review or WAFs? PCI 6.6

Short answer: both. Compliance with requirement 6.6 of the PCI DSS cites the use of either a web application firewall (WAF) or code review. It’s far more effective to …

Fraud costs rise, challenging online businesses

Fraud is taking a bigger bite out of UK online revenues according to the figures come from a survey of 150 online merchants undertaken by CyberSource. One in eight businesses …

Fujitsu develops HDD security technology based on Opal SSC standards

Fujitsu announced the development of new security technology to make its 2.5-inch encrypted hard disk drives support the Opal Security Subsystem Class (Opal SSC). Opal SSC is …

2008 spam lessons learned: “Stop the guns, not just the bullets”

Marshal8e6, a provider of web and email security products, released its TRACE report for the second half of 2008 which finds that while global spam volumes continued to …

NetMRI 3.0 introduces impact analysis to Network Configuration and Change Management

NetMRI 3.0 solves the number-one challenge that undermines network performance and policy compliance – internal changes to the network, whether malicious or inadvertent …

Don't miss

Cybersecurity news