Please turn on your JavaScript for this page to function normally.
Network Access Control: Bridging the Network Security Gap

The business work place has evolved significantly over the last ten years. Back then, networks were far more simplistic; the internet was not a critical business tool, there …

Microsoft Internet Explorer least vulnerable browser in Q4

Cenzic released its Application Security Trend Report for Q4 2007. This report includes a consolidation of findings for all of 2007, along with the Top 10 Web application …

Top 10 vulnerabilities in Web Applications in Q4 2007

Open SSL Off-By-One Overflow – An off-by-one overflow is triggered by the SL_Get_Shared_Ciphers() function and can execute arbitrary code on the target system. Java Web …

Cybercriminals develop tools to test malware before distribution

According to PandaLabs, cyber-crooks are looking for ways to test their creations before distributing them. An investigation conducted by the malware analysis and detection …

Windows Server 2008 certification for Kaspersky Anti-Virus 6.0

Kaspersky Anti-Virus 6.0 for Windows Server Enterprise Edition earned a Windows Server 2008 software certification. Windows Server 2008 certification guarantees that Kaspersky …

Windows Server 2008 certification for GFI EventsManager 8

GFI Software announced that its award-winning events monitoring and events management solution GFI EventsManager 8 has achieved “Certified for Windows Server 2008′ …

Consumer attitudes toward internet security across Europe and North America

F-Secure today announced the results of its first annual Online Wellbeing Survey. This third-party survey of Internet users aged 20-40 in the US, Canada, the UK, France and …

Hardware security modules for Windows Server 2008

Hardware security modules play a vital role in providing incremental security capabilities for business applications. In many industries the use of HSMs is either specifically …

Foundstone services to focus on virtualization security

McAfee, Inc. unveiled the industry’s first service designed to help organizations securely deploy virtualization technologies. As part of its strategy to provide the …

New AVG Internet Security 8.0

AVG Technologies released AVG Internet Security 8.0, the latest version of its flagship suite for consumers and SMBs. The product delivers a significant number of new benefits …

Trend Micro acquires Identum for identity-based email encryption

Trend Micro announced today the acquisition of UK-based Identum, a developer of email encryption technology, as well as the world’s first fourth generation cryptography …

EnCase to further address Government cyber security challenges

Guidance Software announced new capabilities that allow federal agencies to identify, assess and remediate policy violations and vulnerabilities across the network. These …

Don't miss

Cybersecurity news