Please turn on your JavaScript for this page to function normally.
The first mobile SSL VPN for Smartphones

Aventail announced Aventail Connect Mobile for smartphones—the industry’s first and only SSL VPN to provide full support and secure end point control for Windows Mobile …

Results from Distributed Open Proxy Honeypot Project

Breach Security announced the results of the Web Application Security Consortium’s (WASC) new Distributed Open Proxy Honeypot Project. The Honeypot Project is capturing …

Fortify integrates intellectual property from the Secure Software acquisition

Fortify Software announced the release of a major update to the Fortify Secure Coding Rulepacks. The update includes the integration of intellectual property obtained from …

F-Secure Anti-Virus for Microsoft Exchange Version 7 just released

F-Secure today announced the availability of the newest addition in its family of corporate data protection solutions: F-Secure Anti-Virus for Microsoft Exchange Version 7. It …

Weekly report on viruses, trojans and malware

This week’s PandaLabs’ report focuses on three Trojans, Alanchum.VL, Downloader.OHC and Cimuz.FH, and a worm that spreads through instant messaging, MSNDiablo.A. …

File Anti-Copy 3.1 security utility released

HiHiSoft has announced the immediate availability of File Anti-Copy 3.1, a simple security utility that will protect selected files from being opened, copied, or deleted …

160,000 computers infected with Mpack malware downloader

An exploit detected by NanoScan led PandaLabs on the trail to uncover Mpack, a program used to download malware onto remote computers by exploiting numerous vulnerabilites. …

How To Prepare For a Security Information and Event Management Deployment

Fail to prepare, as the saying goes, and you prepare to fail. This maxim certainly applies to most large-scale IT projects, and doubly so for Security Information and Event …

Transportation Security Administration sued for reckless violation of the Privacy Act

Calling the recent loss of employee personal data a breach of the Privacy Act, the American Federation of Government Employees (AFGE) — which represents employees …

Tool used to control botnets across 54 countries discovered

An investigation by PandaLabs has uncovered an application -called Zunker- created by cyber-crooks to control zombie computers in botnets. In the case discovered by PandaLabs, …

New solution ensures safety of backed-up and archived data

Teradata announced that it has expanded its partnership with Protegrity Corporation to offer Defiance BAR (backup, archive, and recovery) Encryption, a new software solution …

New eBay Phishing mail scares users into revealing information

What do you do when you receive an email from an online financial company that you regularly deal with, informing you about the completion of a transaction that you never did …

Don't miss

Cybersecurity news