Please turn on your JavaScript for this page to function normally.
Revealing The Myths About Network Security

Many people and businesses unknowingly leave their private information readily available to hackers because they subscribe to some common myths about computer and network …

Panda Software’s TruPreventTM Technologies win the “CeBIT Highlights” award for best software

Panda Software’s TruPreventTM Technologies have won the “CeBIT Highlights 2006” award for best software, at the world’s largest IT fair, CeBIT. …

Zippo Trojan Horse Demands 175 Pounds For Victims’ Encrypted Data, Sophos Reports

Sophos experts crack password used in criminal attackExperts at SophosLabs, Sophos’s global network of virus, spyware and spam analysis centres, have warned users about …

Sentenial first Irish company to achieve joint ISO 9000 and IS17799 / BS7799 Security Standard

Maynooth, Kildare, Wednesday, 15 March 2006…. Sentenial, the International Enterprise Direct Debit Software and Service Provider, now joins only a handful of companies …

60% of WiFi networks lack protection according to a PandaLabs survey

Panda Software has published the “Security in Wireless Networks”, report by PandaLabs, highlighting the security deficiencies in WEP, the most widely used protocol …

Husband And Wife Face Slammer For Trojan Horse That Spied On Businesses, Sophos Reports

Experts at SophosLabs, Sophos’s global network of virus, spyware and spam analysis centres, have welcomed the news that a married couple are to be jailed for developing …

University Of Wales Protects And Accelerates New Campus Wireless Network With Blue Coat Appliance

CAMBERLEY, UK – March 14, 2006 – Blue Coat® Systems, the leader in secure content and application delivery, today announced that its ProxySGâ„? appliance with …

Philip Zimmermann releases Zfone, a product that secures VoIP

Zimmermann thinks Zfone is better than the other approaches to secure VoIP, because it achieves security without reliance on a PKI, key certification, trust models, …

Neoscale Unveils Cryptostor Keyvault For Centralized, Multivendor Storage Encryption Key Management

MILPITAS, Calif. — March 14, 2006 — NeoScale Systems Inc., the premier provider of enterprise storage security solutions, today announced CryptoStor KeyVaultâ„?, the …

Winmagic To Develop First Full-Disk Encryption Software To Fully Integrate With Infineon’s Trusted Module Platform (TPM) Security Chip

Mississauga, Ontario, March 13, 2006 – WinMagic Inc. (www.WinMagic.com), the innovative leader in full-disk encryption, today announced at CeBIT (Hall 7, Booth A20) that …

Six Credit Unions Choose Green Armor Solutions’ Identity Cues Two Factor for FFIEC and NCUA Compliant Two-Factor & Two-Way (Mutual) Authentication

HACKENSACK, N.J. — March 13, 2006 — Six credit unions from across the United States are implementing Green Armor Solutions’ Identity Cues Two Factor …

Legal Expert Speaks at I.T Security Seminar

LONDON, March 13, 2006 – An area often overlooked in the implementation of an organisation’s IT security infrastructure is that of the legal consequences of a …

Don't miss

Cybersecurity news