Please turn on your JavaScript for this page to function normally.
Google releases the Browser Security Handbook

Google released the Browser Security Handbook to the general public. The 60-page document provides a comprehensive comparison of a broad set of security features and …

The P2PShared.U worm is using new tricks to infect users’ computers

PandaLabs has detected an email message claiming to be a special Christmas offer from McDonald’s, but which really spreads the P2PShared.U worm. The email subject is …

New Word vulnerability if exploited could allow full system access and control

Palo Alto Networks announced that its Threat Research Team discovered one of the six critical vulnerabilities communicated in Microsoft’s Patch Tuesday security bulletin …

What To Do About Social Networking In Your Company

The growing popularity of social networking sites such as Facebook, Bebo and MySpace is slowly developing into a massive headache for IT administrators as employees spend time …

Survey reveals link between privileged users and breaches

Imperva announced that key findings in a new independent benchmark report conducted by Aberdeen Group reveal that monitoring privileged database users significantly reduces …

European mobile operators aren’t protecting users against spam

Cloudmark announced the results of a recent survey, which finds that 100 percent of the top 12 mobile operators in Europe anticipate mobile spam volumes to rise as adoption of …

Consumers trust biometrics for data protection

More than two-thirds (67 percent) of consumers surveyed around the world trust fingerprint scans to verify their identities with banks, government agencies and other …

New AirMagnet Survey features help optimize Voice-Over-WLAN

AirMagnet announced new features for AirMagnet Survey that enhanced its ability to help customers optimize their voice-over-WLAN (VoWLAN) deployments for Cisco and Vocera …

Enterprise-wide approach improves financial crime fighting performance

Research among international financial services organizations undertaken by Norkom Technologies reveals that those who have adopted an enterprise-wide approach to the …

2009 IT security forecast

As 2008 – a year in which a record number of data breaches occurred and over 22 million records were compromised – comes to a close, Utimaco has unveiled the top …

Enhanced line of Sun Fire x64 servers and Sun Blade systems

Sun Microsystems announced an enhanced line of Sun Fire x64 servers and Sun Blade systems that deliver up to 35 percent better performance over previous generations. With the …

Cybercriminals use Flash ads for distributing malicious code

Finjan announced the latest findings by its Malicious Code Research Center (MCRC) indentifying and analyzing the latest trends in cybercrime. Cybercriminals take advantage of …

Don't miss

Cybersecurity news