Please turn on your JavaScript for this page to function normally.
Mobile users do not take security precautions

F-Secure Corporation announced mobile security results from its Online Wellbeing survey. Over three quarters of mobile phone users are aware that malware can infect a mobile …

Trojans are the most active malware type in February

Trojans accounted for 23.70% of infections registered by ActiveScan, Panda Security’s online scanner, in February. However, the infections caused by this type of …

New security event management reporting solution

Secure Computing announced the availability of SecurityReporter, a new security event management reporting solution for both Sidewinder and SnapGear appliances. …

Groton man sentenced on fraud charges

Michael R. Thorpe, age 61, was sentenced in federal court to 46 months’ imprisonment, to be followed by three years of supervised release, and was ordered to repay $1.7 …

Scalable 10 Gbps intrusion prevention solution

As enterprise networks evolve, 10 Gbps network links have become relatively low in cost and increasingly more widespread. Core network upgrades driven by data center …

Compress and encrypt files from the Finder

Apimac released Compress Files “08, a compression tool for Mac OS X that enable Mac users to create a variety of compressed and encrypted files as well as encrypted disk …

Tax-time tips to prevent identity theft

According to the IRS, a record 77 million tax returns were filed electronically in 2007 and these figures are sure to increase in 2008. For an identity thief, tax time is …

Optimal IdM introduces Virtual Identity Server

Optimal IdM launched its Virtual Identity Server, a Microsoft-centric virtual directory that is developed entirely in .NET managed code and enhances the functionality of …

Network Access Control: Bridging the Network Security Gap

The business work place has evolved significantly over the last ten years. Back then, networks were far more simplistic; the internet was not a critical business tool, there …

Microsoft Internet Explorer least vulnerable browser in Q4

Cenzic released its Application Security Trend Report for Q4 2007. This report includes a consolidation of findings for all of 2007, along with the Top 10 Web application …

Top 10 vulnerabilities in Web Applications in Q4 2007

Open SSL Off-By-One Overflow – An off-by-one overflow is triggered by the SL_Get_Shared_Ciphers() function and can execute arbitrary code on the target system. Java Web …

Cybercriminals develop tools to test malware before distribution

According to PandaLabs, cyber-crooks are looking for ways to test their creations before distributing them. An investigation conducted by the malware analysis and detection …

Don't miss

Cybersecurity news