Please turn on your JavaScript for this page to function normally.
Former U.S. Attorney General to keynote at InfoSec World 2008

MISTI announced the addition of former U.S. Attorney General John D. Ashcroft as a keynote speaker at InfoSec World Conference and Expo 2008. Ashcroft will join an impressive …

GFI cuts prices of its security products by up to 45%

GFI Software has cut its prices on the majority of products by up to 45%. This is being done to reflect GFI’s longstanding belief in providing companies in the SMB …

Endpoint Protector 2008 addresses wireless USB security issues

The new Endpoint Protector 2008 efficiently protects PCs from data loss, data theft and other forms of data leakage.  The product allows the controlled use of USB devices, …

ID theft – six important safety tips to protect consumers

Monitor your accounts regularly online at bank and credit card websites. Americans who monitor their accounts online are most likely to uncover suspicious or unauthorized …

New release of Kaspersky Mobile Security

Kaspersky Lab announced the release of a new product for the integrated protection of smartphones running Symbian and Windows Mobile. Kaspersky Mobile Security 7.0 offers …

Download the new edition of global information security resource guide

(ISC)2 announced the release of its complimentary “2008 Resource Guide for Today’s Information Security Professional, Global Edition”. This 132-page guide …

P2P file sharing 2008’s greatest identity theft threat?

According to the Identity Theft Assistance Center (ITAC), throughout 2008 “criminals will continue to exploit new technologies to commit identity theft.” At the …

Blood bank’s laptops with sensitive information reported stolen

Two laptop computers are missing from Lifeblood blood bank’s possession and presumed to be stolen. The dual-password protected laptops were used on mobile blood …

High performance SSH/SCP – HPN-SSH

SCP and the underlying SSH2 protocol implementation in OpenSSH is network performance limited by statically defined internal flow control buffers. These buffers often end up …

Video: Rogue antispyware applications

Guys from F-Secure show how to find rogue antispyware applications by using Google search.

Microsoft releases five critical security bulletins

Another Patch Tuesday and Microsoft comes out with a variety of patches, and this series is quite serious. Users are recommended to update as soon as possible. The critical …

Downloaders may piggyback on unsecured WLAN to flout new UK laws

Sophos is warning computer users of the importance of properly securing their Wi-Fi networks following reports that people who illegally download music and films may have …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools