Please turn on your JavaScript for this page to function normally.
VueKIT: Surveillance Video over Powerline

VisualGate Systems launched VueKIT, a complete digital surveillance video solution that uses the existing AC wiring in a building to transmit a professional quality video …

Analysis of Microsoft’s October security bulletins

Each month, Microsoft releases new security patches that may impact devices on your network. Many organizations struggle to understand and prioritize these patches and …

Guide to Online Antivirus Solutions Part 8: CA Online Virus Scanner

Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …

Kaspersky Lab uses anti-phishing databases by the PhishTank service

The PhishTank service, run byOpenDNS, offers a consolidated database of known fishing websites which is continually updated by the Open Source community and ordinary users. …

86 per cent of all emails are spam

The weekly Spam Report shows 86 per cent of all emails are spam, according to research carried out by Irish independent consulting and technical services company IT Force. …

E-mail interception a real risk for UK law firms

Interception of email poses a real threat to UK law firms, placing the integrity of their communications at risk, according to an industry survey. The survey, commissioned by …

Removing credit card data seen as key to real security

The consensus of speakers at the just-concluded Real Security Summit is that the future of credit card payments depends on systems that remove useable card data stored …

CryptoMemory prevents cloning and counterfeiting

CryptoMemory devices provide low-cost, secure means of preventing product counterfeiting and/or piracy of Intellectual Property (IP) and OEM parts. CryptoMemory uses a 64-bit …

A closer look at AxCrypt 1.6.3

AxCrypt is one of the best open source file encryption software for Windows. It integrates seamlessly with Windows to encrypt, decrypt, store, send and work with individual …

Who poses the biggest network threat?

Sophos revealed new research into the types of users businesses fear most likely to expose their networks to IT threats. The research shows that 31 percent of companies …

Barracuda Networks and open source intellectual property protection

Barracuda Networks signed a license agreement with the Open Invention Network (OIN) and joined the growing list of companies who are supporting OIN to ensure Linux-based and …

Attacking the Build through Cross-Build Injection

A poorly designed software build process can allow an attacker to insert malicious code into the final product or to take control of a build machine. This paper surveys …

Don't miss

Cybersecurity news