Help Net Security
nCipher extends key management to System i
nCipher plc announced its keyAuthority enterprise key management suite now supports IBM System i platforms (AS/400). Through a partnership with Patrick Townsend & …
Tizor launches first data auditing and protection blog
Tizor Systems announced the launch of the DataAuditingBlog, the first blog about data auditing and its related subjects, which is located at Authored by Prat Moghe, founder …
SteelEye Technology announces support for IBM System i platform
SteelEye Technology announced the expansion of its product set with the immediate availability of its high availability clustering, continuous data protection and disaster …
Solaris turkey worm talks its way through telnet flaw
Sophos is warning computer users of all operating systems of the dangers of malware, as an internet worm that displays offensive messages and cartoon images of talking turkeys …
Malware adopts disguises in attempt to dupe IT defences
Sophos has revealed the most prevalent malware threats and email hoaxes causing problems for computer users around the world during February 2007. The figures, compiled by …
Over 50% of infections detected in February were spyware and trojans
Spyware and Trojans were the malware responsible for most infections in February. As in January, spyware accounted for 33 percent of the infections detected by ActiveScan. …
Top 10 WordPress Anti Spam Plugins
Blog spam is a huge problem but fortunately protection is available and in a few steps you can make sure you are protected. Check out the plugins below, one of them will …
O’Reilly Releases Backup & Recovery
Using a system without backups is like driving your car 100 miles per hour down a busy road the day after your insurance policy expires. Exhilarating, yes. But you know …
Vista tip of the day: Security and Roles in Vista
This video will show you the basics when it comes to protecting your computer from an outside source.
New iQuate software eases Anti-Virus management headaches
iQuate announced the release of iQNetScan 6, the latest version of its clientless PC inventory and IT asset management suite. Traditionally regarded as a leading IT compliance …
HID Global statement on IOActive withdrawing their Black Hat presentation
In response to IOActive’s press release entitled “IOActive Withdraws Black Hat Presentation to Allow ACLU to Present”, HID Global would like to state the …
IOActive withdraws BlackHat presentation; ACLU will present
As an active member of the information security community, IOActive is committed to protecting organizations and the public against technical threats. For example, IOActive …
Featured news
Resources
Don't miss
- When confusion becomes a weapon: How cybercriminals exploit economic turmoil
- SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories
- PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)
- The legal blind spot of shadow IT
- Email authentication simplified: How PowerDMARC makes DMARC effortless