Please turn on your JavaScript for this page to function normally.
Instant messaging – see no evil, hear no evil

FaceTime Communications warns that with one in four employees admitting to sending information about company plans, finances or password/login credentials via instant …

Veracode’s application security testing solution for U.S. Government

Veracode announced it has entered into a partnership and reseller agreement with Patriot Technologies. As the “go-to” source for the Federal Government’s …

HNS Podcast: Vulnerability Management Considerations

In this HNS podcast, Anthony Alves from CORE Security Technologies discusses briefly vulnerability management. He covers some of the things you should consider while …

VPN solution for Symbian OS-based mobile devices

NCP provides users of Symbian OS-based mobile devices with secure access to the company network. The new IPSec client can be used, for example, on mobile devices such as the …

iDetector wireless network capabilities

Graphic Security Systems Corporation (GSSC) will include the Eye-Fi Card for its iDetector authentication device. The iDetector attachment utilizes a Canon digital camera as …

Integrated product for fighting online fraud and identity theft

Intellitactics and Radware have joined forces to provide businesses and government agencies a real-time capability to detect fraud and thwart identity theft. This alliance …

New version of ModSecurity open source web application firewall

Breach Security announced the latest version of its open source ModSecurity web application firewall. The latest release, ModSecurity v2.5, offers a significant improvement in …

Book signings at RSA Conference 2008

From the RSA Conference Blog: “Our speakers and panelists are a very prolific group with many titles to their names. Each year our bookstore partner, Digital Guru, …

Empirical Exploitation of Live Virtual Machine Migration

As virtualization continues to become increasingly popular in enterprise and organizational networks, operators and administrators are turning to live migration of virtual …

90% of public websites are vulnerable to attack

WhiteHat Security released the fourth installment of the WhiteHat Website Security Statistics Report, which calls out the top 10 most prevalent vulnerabilities and provides a …

Automated system lock down tool for Oracle Enterprise Linux

Trusted Computer Solutions announced that it has become a member of the Oracle PartnerNetwork and now offers organizations that have invested in Oracle Enterprise Linux …

New Mac OS X software: Norton AntiVirus Dual Protection for Mac

Symantec announced the new Norton AntiVirus Dual Protection for Mac, featuring vulnerability protection technology and antivirus for Mac users running Boot Camp or Windows …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools