Please turn on your JavaScript for this page to function normally.
The critical importance of Enterprise Rights Management

Anyone wondering why Enterprise Rights Management (ERM) is growing in importance need only review the news stories of the past few years. A US government consultant accesses …

Internet scheme used to steal micro-deposits

Michael Largent, 22, was arraigned on an indictment charging him with multiple counts of computer fraud, wire fraud, and mail fraud. This case is the product of an extensive …

Hardware encryption-secured flash drive

EDGE Tech Corp introduced its rough-and-tough, hardware encryption-secured flash drive, the DiskGO Secure GUARDIAN. Utilizing mandatory 256-bit AES hardware encryption, the …

Web application security landscape and trends

In the latest issue of the HNS Podcast, Mandeep Khera from Cenzic shares web application security trends observed by his company in the first quarter of 2008. Mr. Khera also …

Apple updates security with Mac OS X 10.5.3

The Mac OS X 10.5.3 Update is recommended for Mac OS X 10.5, 10.5.1, and 10.5.2 Leopard. It includes general operating system improvements that enhance the stability, …

Adobe Flash Player remote code execution vulnerability roundup – update #2

Adobe Flash Player contains an code execution vulnerability. An attacker may be able to trigger this overflow by convincing a user to open a specially crafted SWF file. The …

HNS Book giveaway: “The Future of Reputation: Gossip, Rumor, and Privacy on the Internet”

June 05 2008: The winner is Jeffry B. ———————————- We are giving one of our readers a copy of “The …

Insider threats keep IT directors awake at night

Secure Computing announced the results of an IT Director survey that uncovers a rising concern of insider threats and widespread acknowledgement of being unprepared for …

Preparations for secure collaboration in a de-perimeterized business world

Jericho Forum released the results of a spot survey of 22 IT security vendors that responded to questions about vendor preparedness to deliver security for today’s …

Full disk encryption for the Mac platform

Check Point announced the release of Check Point Full Disk Encryption for Mac OS X, the industry’s first full-disk encryption solution with pre-boot authentication to …

The Botnet Business

Botnets have been in existence for about 10 years; experts have been warning the public about the threat posed by botnets for more or less the same period. Nevertheless, the …

When it comes to data breaches business owners have false sense of security

A recent national survey of more than 1,500 business leaders conducted by Zogby International on behalf of Identity Theft 911 found that business decision makers possess an …

Don't miss

Cybersecurity news