Please turn on your JavaScript for this page to function normally.
Spammers cloak their reputation

A major trend throughout 2008 that intensified during the third quarter is spammers’ increased use of cloaking techniques to hide their poor reputation behind someone …

New book: “Nagios: System and Network Monitoring, 2nd Edition”

The convenience and reliability that monitoring programs offer system administrators is astounding. Whether at home, commuting, or on vacation, admins can continuously monitor …

NVIDIA Tesla supercomputers used for password recovery

ElcomSoft announces the support of the latest generation of NVIDIA Tesla, compact supercomputers based on NVIDIA GPU acceleration technologies, in Elcomsoft Distributed …

Global State of Information Security Survey 2008 findings

Asian companies have made dramatic gains in upgrading their information security efforts, according to the 6th annual Global State of Information Security Survey 2008. The …

Q3 2008 Email Threats Trend Report highlights

 New camouflage tactics spammers use to cloak their bad reputations enable malware and unwanted messages to infiltrate inboxes, according to a new report by Commtouch. …

Organized cybercrime replaces random individual attacks

Targeted and organized, profit-driven attacks are replacing random individual hacker attacks and presenting increased threats for businesses and government, says the …

Data privacy application from SAP and Cisco

SAP and Cisco announced the availability of a composite application that will help organizations proactively enforce data privacy across the business network. The solution is …

New SSL VPN gateway – Connectra NGX R66

Check Point announced Connectra NGX R66, its access gateway that combines SSL VPN, IPSec VPN and intrusion prevention with centralized management. The new release of Connectra …

Updated CompTIA Security+ Exam available October 14

The Computing Technology Industry Association (CompTIA), the leading provider of vendor-neutral certifications for the world’s technology workforce, announced today the …

New book: “iPhone UK: The Missing Manual”

iPhone UK: The Missing Manual, Second Edition (O’Reilly) is the first book about every Apple improvement to its own second edition–the iPhone 3G and iPhone 2.0. …

Check Point’s DynamicID simplifies two-factor authentication

Check Point announced a new authentication technology that leverages mobile devices to increase enterprises’ network security. While other solutions require multiple …

Secure Computing supplies SCADA-specific security signatures

Secure Computing is incorporating three new signature file types for SCADA-specific protocols into its Secure Firewall. SCADA (Supervisory Control and Data Acquisition) …

Don't miss

Cybersecurity news