Please turn on your JavaScript for this page to function normally.
iDetector wireless network capabilities

Graphic Security Systems Corporation (GSSC) will include the Eye-Fi Card for its iDetector authentication device. The iDetector attachment utilizes a Canon digital camera as …

Integrated product for fighting online fraud and identity theft

Intellitactics and Radware have joined forces to provide businesses and government agencies a real-time capability to detect fraud and thwart identity theft. This alliance …

New version of ModSecurity open source web application firewall

Breach Security announced the latest version of its open source ModSecurity web application firewall. The latest release, ModSecurity v2.5, offers a significant improvement in …

Book signings at RSA Conference 2008

From the RSA Conference Blog: “Our speakers and panelists are a very prolific group with many titles to their names. Each year our bookstore partner, Digital Guru, …

Empirical Exploitation of Live Virtual Machine Migration

As virtualization continues to become increasingly popular in enterprise and organizational networks, operators and administrators are turning to live migration of virtual …

90% of public websites are vulnerable to attack

WhiteHat Security released the fourth installment of the WhiteHat Website Security Statistics Report, which calls out the top 10 most prevalent vulnerabilities and provides a …

Automated system lock down tool for Oracle Enterprise Linux

Trusted Computer Solutions announced that it has become a member of the Oracle PartnerNetwork and now offers organizations that have invested in Oracle Enterprise Linux …

New Mac OS X software: Norton AntiVirus Dual Protection for Mac

Symantec announced the new Norton AntiVirus Dual Protection for Mac, featuring vulnerability protection technology and antivirus for Mac users running Boot Camp or Windows …

Secure360 conference to focus on key security issues

Security professionals in the Upper Midwest can learn what’s new in “Evolving Security Threats and Practical Solutions” at the 2008 Secure 360 Conference on …

Microsoft acquires rootkit detection provider

Microsoft Corp. announced it has acquired Maryland-based Komoku Inc., a provider of advanced rootkit security detection solutions. Microsoft expects to add Komoku’s …

Don’t sign your refund check over to malware writers

With tax season coming down to the wire, most American households are preparing to fire up their web browsers in order to use one of the main online tax preparation software …

Weekly report on viruses and intruders

Among the thousands of malicious codes that have appeared this week, the present PandaLabs report focuses on the Bankolimb.AF Trojan and the Autorun.RS worm. When it is run, …

Don't miss

Cybersecurity news