Please turn on your JavaScript for this page to function normally.
Trojans: weapon of choice for cyber-crooks

Trojans accounted for 74 percent of new malware variants that appeared during the first quarter of 2007, according to PandaLabs. This represents an increase of 20 percent …

EMEA release of Sunbelt Messaging Ninja v2.1

Nayatek announced today at Infosecurity Europe 2007 the official EMEA release of Sunbelt Messaging Ninja version 2.1, the all-in-one, best-of-breed email security product for …

Rise of web-based malware in Q1 2007

Sophos has announced the results of its research into worldwide cybercrime activity during the first three months of 2007. The findings reveal that the overall number of new …

Five percent of world’s spam sent via Polish ISP

Earlier this month, Sophos revealed that there was a surprise newcomer to the dirty dozen spam relaying countries. Having never made an appearance in this chart previously, …

Top 10 Threats in March

During the month of March, Trojan Downloader Zlob was the most commonly found Trojan worldwide. This Trojan often silently downloads and installs bogus security programs such …

Report reveals overconfidence in application penetration testing

Fortify Software has released a report, entitled “Misplaced Confidence in Application Penetration Testing,” that details overconfidence in application penetration …

Remote management solution for encrypted backup tapes and optical discs launched

DISUK launched iSecure smart card management for its Paranoia2 and SafeTape in-line encryption devices that keep vital backup data secure and compliant with standards such as …

Huntsman 5 defends against unknown threats

Tier-3 has launched Huntsman 5 which provides complete enterprise wide threat management, real time compliance and operational risk management capabilities.  …

PDF security book: “Building or Buying VPNs”

Short Cuts are short, concise, PDF documents designed specifically for busy technical professionals. Pearson just released the following title: Building or Buying VPNS …

Georgia Southern computer security expert authors new reference book “Computer Forensics”

Computer security expert Robert Newman says the average person has no idea how much information is available about him or her in cyberspace or how to prevent that information …

Secure input, management, analysis and sharing of critical information with Memex Series VI

Memex announced the availability of Memex Series VI, a full suite of software tools that enables the secure input, management, development, analysis and sharing of …

Another vendor joins Open Web Application Security Project

Cenzic announced that the company has joined the Open Web Application Security Project (OWASP), a not-for-profit foundation, as a Vendor Organization member and will sponsor …

Don't miss

Cybersecurity news