Help Net Security
The Identity Theft Resource Center’s 2008 breach report
Reports of data breaches increased dramatically in 2008. The Identity Theft Resource Center’s 2008 breach report reached 656 reported breaches at the end of 2008, …
Eikon fingerprint reader and 1Password password manager combination
UPEK and Agile Web Solutions announced that the companies will be demonstrating at Macworld the Eikon Digital Privacy Manager integrated with 1Password Password Manager, …
World’s first button backup USB flash drive from SanDisk
SanDisk introduced an innovative new family of USB flash drives, including the world’s first backup USB flash drive with simple backup software activation at the touch …
FreeBSD 7.1 has been released
The FreeBSD Release Engineering Team is pleased to announce the availability of FreeBSD 7.1-RELEASE. This is the second release from the 7-STABLE branch which improves on the …
The PalmSecure LOGONDIRECTOR Enterprise Edition identity management solution
Fujitsu launched the PalmSecure LOGONDIRECTOR Enterprise Edition, a fully scalable, centrally administered identity management solution integrates the Fujitsu PalmSecure palm …
Verbatim 8GB Store ‘n’ Go retractable USB drive for Mac OS X systems
Verbatim released a Mac OS X compatible 8GB Store ‘n’ Go USB drive. With the retractable design, the new Mac drive’s USB connectors are fully protected …
Majority of companies spend “no time’ managing their security systems
Nearly two-thirds of UK businesses do not look after their Internet security effectively, according to new research. A survey undertaken by Network Box, found that just over …
Yoggie brings true online anonymity to computer users
Yoggie launched the Online Anonymity feature for its miniature security computers. With a single mouse click, surfers can completely ‘cloak’ their Web browsing …
VeriSign transitions all new RapidSSL certificates to SHA-1 algorithm
VeriSign announced an immediate transition to the SHA-1 algorithm on new RapidSSL brand certificates. The transition to the SHA-1 algorithm came within a few hours of the …
Tales from the support crypt: infected DVD drives, antiviruses that blow fuses and more
Talking viruses, infected physical devices, lights that go out are some of the “problems” Panda Security’s tech support service has had to face. Many of them …
Security Trends of 2008 and Predictions for 2009
As a new year approaches we must prepare for new Internet security threats. Every year, new and innovative ways of attacking computer users emerge and continue to increase in …
Rogue antivirus applications related to Continental Flight 1404 and other current news
Webroot has detected a new string of rogue antivirus applications that use URLs related to Continental Flight 1404 and other current news to manipulate consumers into …
Featured news
Resources
Don't miss
- GitHub project maintainers targeted with fake security alert
- Pay, fight, or stall? The dilemma of ransomware negotiations
- Review: Cybersecurity Tabletop Exercises
- IntelMQ: Open-source tool for collecting and processing security feeds
- Quantifying cyber risk strategies to resonate with CFOs and boards