Please turn on your JavaScript for this page to function normally.
Belkin OmniView Secure DVI KVM Switch with EAL 4+ and TAA compliancy

Belkin today announced its new OmniView Secure DVI KVM Switch, NIAP listed to conform to Common Criteria EAL 4+ and augmented with ALC_FLR.3—important factors for U.S. …

Email security offering that leverages the benefits of cloud computing

Cloudmark introduced its new CloudFilter email security solution, a cloud-based email security offering specifically designed to free Web hosters and service providers from …

First open source virtual desktop client

VMware announced the first open source client for virtual desktop infrastructure, VMware View Open Client which enables IT organizations to safely host user desktops in the …

Applied Binary Code Obfuscation

An obfuscated code is the one that is hard (but not impossible) to read and understand. Sometimes corporate developers, programmers and malware coders for security reasons, …

MSI unveils HoneyPoint Personal Edition 2.00

MSI released HoneyPoint Personal Edition 2.00, a solution that basically serves up “fake” services on systems. These services then lie in wait for attackers and …

Latest study shows data breach costs continue to rise

PGP Corp. and the Ponemon Institute announced results of the fourth annual U.S. Cost of a Data Breach Study.  According to the study which examined 43 organizations across …

IPv6 Security

With the online world rapidly expanding, we are moving towards the IPv6 protocol. With this migration it becomes essential for networking professionals to gain insight into …

Encrypting USB drives with on-board antivirus scanning

Spyrus announced the Hydra PC ViP product family with on-board virus protection. Hydra PC ViP with the Hydra PC Sentry A-V antivirus scanning application completely protects …

Citizen data protection in focus: Europe needs a strategy

The European Network and Information Security Agency (ENISA) today launched its Position Paper on security features in European eID schemes. The paper gives the first overview …

Video: RFID wardriving

Ethical hacker Chris Paget demonstrates a low-cost mobile device that surreptitiously reads and clones RFID tags embedded in United States passport cards and enhanced …

Web applications are the Achilles’ heel for corporate IT security

IBM’s annual 2008 X-Force Trend and Risk report found that corporations are unwittingly putting their own customers at risk for cyber-criminal activity. With an alarming …

Manage all privileged passwords with Enterprise Random Password Manager

Lieberman Software announced version 4.7 of Enterprise Random Password Manager, providing improvements in deployment, scalability and compliance for large, multi-site …

Don't miss

Cybersecurity news