Please turn on your JavaScript for this page to function normally.
Sophos assists computer crime unit in a botnet master case

Sophos assisted the Metropolitan Police Computer Crime Unit in bringing a case against Robert Matthew Bentley.  The hacker, of Panama City, Florida, who went by the alias …

Virtual worlds face malware reality check

Gaming industry is consistently stripped of its virtual assets as cyber-crooks continue to exploit gamers in pursuit of financial gain. Virtual worlds can provide an exciting …

Explaining non-delivery report type of spam

Research shows that up to 90% of emails received by companies are spam, and spammers have adopted a variety of methods to bypass spam filters used in anti-spam software. In …

PCI Compliance Explained

Learn about the Payment Card Industry Data Security Standard (PCI DSS), a security standard that includes requirements for security management, policies, procedures, network …

When it comes to data security breaches, the general public doesn’t need to know

When it comes to data security breaches, 78 percent of US IT decision-makers feel that companies do not need to inform the general public; this according to a recent survey by …

Best of Open Source Security Conference announced

Sourcefire announced the launch of the Best of Open Source Security (BOSS) Conference. Scheduled to run concurrently with Sourcefire’s annual customer summit, the BOSS …

Cross platform data security for Windows Vista, XP & Mac OS X

GT Security launched SecuriKey v3.0, providing full support for Windows Vista, Windows XP, Mac OS X Leopard and Mac OS X Tiger. Designed to keep mobile data safe, SecuriKey …

Free e-book: “Scared Safe: Life’s Little Identity Theft Prevention Handbook”

E-Book entitled “SCARED SAFE: Life’s Little Identity Theft Prevention Handbook” by Todd Feinman, is available for free download beginning today for anyone …

New solution for protecting wireless devices from data loss

Based on the successful Computrace desktop and laptop management solution from Absolute, new Computrace Mobile is the only solution on the market for the management of all …

Storm and the future of social engineering

In 2007, Storm burst onto the scene and spread rapidly. A new form of malware that propagated using a combination of email and websites, it proved extraordinarily …

Critical vulnerability in Citect’s SCADA software

Core Security Technologies issued an advisory disclosing a vulnerability that could severely impact organizations relying on Citect’s flagship industrial process control …

Plug-and-play NAC appliance from Mirage Networks

Mirage Networks introduced a new appliance, the MAX-500, that brings complete NAC coverage in the form of a plug-and-play appliance. The new platform offers all components of …

Don't miss

Cybersecurity news