Please turn on your JavaScript for this page to function normally.
Intel ships enterprise-class solid-state drives

Intel has begun shipping the Intel X-25E Extreme SATA Solid-State Drive (SSD), aimed at server, workstation and storage systems. Unlike mechanical drives, the SSDs contain no …

Iomega Linux-powered secure NAS device

Iomega announced the new StorCenter ix2, a network storage appliance for small businesses and the home. With just four mouse clicks, users can configure up to two terabytes of …

Flash Player update addresses Clickjacking issue

Potential vulnerabilities have been identified in Adobe Flash Player 9.0.124.0 and earlier that could allow an attacker who successfully exploits these potential …

Phishing campaign targeting Facebook aficionados

BitDefender researchers have detected an IM-based spam wave automatically sent to accounts which promises a “hot date” if the Facebook’s users access the …

Protection suite for Linux multi-site cluster

New SteelEye Protection Suite for Linux Multi-Site Cluster is aimed towards Linux users looking to cost-effectively extend existing high-availability capabilities as well as …

Spammers cloak their reputation

A major trend throughout 2008 that intensified during the third quarter is spammers’ increased use of cloaking techniques to hide their poor reputation behind someone …

New book: “Nagios: System and Network Monitoring, 2nd Edition”

The convenience and reliability that monitoring programs offer system administrators is astounding. Whether at home, commuting, or on vacation, admins can continuously monitor …

NVIDIA Tesla supercomputers used for password recovery

ElcomSoft announces the support of the latest generation of NVIDIA Tesla, compact supercomputers based on NVIDIA GPU acceleration technologies, in Elcomsoft Distributed …

Global State of Information Security Survey 2008 findings

Asian companies have made dramatic gains in upgrading their information security efforts, according to the 6th annual Global State of Information Security Survey 2008. The …

Q3 2008 Email Threats Trend Report highlights

 New camouflage tactics spammers use to cloak their bad reputations enable malware and unwanted messages to infiltrate inboxes, according to a new report by Commtouch. …

Organized cybercrime replaces random individual attacks

Targeted and organized, profit-driven attacks are replacing random individual hacker attacks and presenting increased threats for businesses and government, says the …

Data privacy application from SAP and Cisco

SAP and Cisco announced the availability of a composite application that will help organizations proactively enforce data privacy across the business network. The solution is …

Don't miss

Cybersecurity news