Please turn on your JavaScript for this page to function normally.
A study into corporate end user awareness of Web threats

Trend Micro announced the results of its study into corporate end users’ awareness of Web threats. The study tracked responses from 1600 corporate computer end users …

AT&T offers new security alerting and notification service

AT&T Inc. recently announced the availability of My Internet Protect, a security knowledge mining, alerting and notification service for identified threats that enter a …

SAIC addresses possible data compromise

Personal information of certain uniformed service members, family members and others was placed at risk for potential compromise while being processed by SAIC under several …

Video: Exploiting the iPhone

This is the demonstration of an iPhone exploit developed by the software security group at Independent Security Evaluators.

New Excel spam hits the airwaves

Microsoft Excel is the newest packaging spammers have created for their stock pump-and-dump scams, Commtouch reported today, based on the Company’s analysis of billions …

Lock the Door and Make Sure Your Data is Protected

You would think that at some point in time your children will reach the age at which you can reason with them, I’m hoping it’s a year older than the oldest one is …

Microsoft Excel virus and a ransomware trojan

It is very easy to know when Pahooka.A has infected a computer. Once run, it replaces the computer’s desktop wallpaper with a multicolored star on a blue background and …

Peer-to-peer software leaks confidential police data

IT security and control firm Sophos is reminding companies of the importance of enforcing stringent IT security policies after it was revealed that a Japanese policeman has …

Data protection made better with Encryptionizer

NetLib announced the availability of the company’s next release of its flagship product, NetLib Encryptionizer. The company’s enhanced data encryption solution …

LaCie unveils 2TB Big Disk Extreme+ with advanced backup software

LaCie unveiled the triple-interface Big Disk Extreme+ with LaCie Shortcut Button and included EMC Retrospect backup and recovery software for Windows/Mac OS. This versatile …

The Rules for Computer Forensics

The recovery of evidence from electronic devices is fast becoming another component of many the IT Manager’s remit. Electronic evidence gathered is often valuable …

How To Recover Forgotten Microsoft Word Passwords

Microsoft Office applications have an option for setting up different levels of passwords. They can be used for specific actions such as preventing reading, writing or adding …

Don't miss

Cybersecurity news