Please turn on your JavaScript for this page to function normally.
Kendall Howard’s new Anti-Theft PC Security Stand

Kendall Howard today announced the launch of its Anti-Theft PC Security Stand, the industry’s most advanced method for keeping PC hardware safe from theft and general …

Washington D.C. workshop on side-channel analysis attacks on embedded devices

Cryptography Research will hold a one-day workshop about how to thwart attacks on embedded devices like mobile communication systems. The workshop is entitled: “An …

Integrated solution secures corporate web applications

WhiteHat Security announced the general availability of an integrated solution with F5 Networks. The new offering allows enterprises to attain expert-level Web application …

Second generation Drobo storage device

Featuring FireWire 800 alongside improved USB 2.0 performance and an upgraded core processor, the new Drobo is the fastest product in its class for managing and storing …

Network Warrior

The Cisco CCNA network associate certification validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including …

Hacker-friendly wireless router from Netgear

The new Netgear Open Source Wireless-G Router (WGR614L) is a full-featured wireless router designed to serve as a reliable, high-performance platform to support a wide variety …

New high performance UTM appliances

Check Point expanded its UTM-1 Total Security appliance line. The appliances provide a security solution that combines firewall, virtual private network (VPN), intrusion …

Workshop highlights adoption of identity-based encryption

Voltage Security today summarized the results from the recent National Institute of Standards and Technology (NIST) sponsored workshop: Applications of Pairing Based …

Top of the Zombie charts: Verizon, Telecom Italia and Brasil Telecom

Commtouch released its second quarter 2008 Email Threats Trend Report, based on the automated analysis of billions of email messages weekly. The report examines recent trends …

Statistics show that spammers are not giving up

While antispam filters have become more sophisticated in the last year, and spam threats have emerged and dissipated, it is clear that spammers are not giving up the spam …

Hacked personal email accounts used for personalized 419 scam

At first glance, the email below looks like a typical 419 scam: The twist is that the email came from a user’s hacked webmail account and was sent to his personal list …

Encryption key management for Oracle Database 11g

nCipher announced its nShield and netHSM key management solutions are now integrated with Transparent Data Encryption, part of Oracle Database 11g Advanced Security option. …

Don't miss

Cybersecurity news