Help Net Security
Panda Software launches 2007 range of products
Panda Antivirus 2007 is the lightest antivirus in the Panda Software consumer solutions range. This new, easy-to-use, antivirus solution offers complete protection against …
Wave to support Trusted Computing Group’s Security Specifications for Mobile Phones
Wave Systems Corp. announced plans to extend its EMBASSY Trust Suite software in support of the newly published TCG security specifications for mobile phones. The announcement …
Arxceo awarded U.S. Patent for Anti-Reconnaissance and Anti-Address Spoofing technology
Arxceo Corporation has been awarded a crucial U.S. patent covering its core technology and approach to improving network security with its Plug and Protect (PnPRO) and …
Registration opens for updated CompTIA A+ Certification
The Computing Technology Industry Association (CompTIA), the world’s largest provider of vendor neutral certifications for professionals in the information technology …
Trusted Computing Group announces Open Specification for Mobile Phone Security
The Trusted Computing Group’s Mobile Phone Work Group, which has been working to create an industry-wide approach to securing data, transactions and content, for mobile …
Experts say laptops are the weak link in data security
New research has found that the frequency of laptop theft in the workplace is high. The findings mirrored those from last year, which indicated a similar lack of security …
Constructing Secure Storage Area Networks
Increasingly concerned about the availability of their business data, many enterprises over the last five years have implemented sophisticated storage area networks (SANs). …
Considered outsourcing the role of Chief Information Security Officer?
Organizations are barraged with overlapping regulatory compliance requirements and security vulnerabilities. For many small-to-midsize businesses a full-time Chief Information …
Compact Disc Eraser – Top American invention prevents eWaste
It is common for CD-R and DVDR users to accumulate stacks of old discs that are no longer needed or outdated. A personal CD destroyer is now available that helps prevent data …
KoolSpan awarded in a review of two-factor authentication solutions
KoolSpan announced it has received five-stars and an ‘SC Recommended’ designation in a comparative group review of two-factor authentication technologies in the …
Private Internet use by staff threatens IT security in Danish companies
IT analysis company IDC has recently published a new survey containing some alarming results: within the last year, almost 40% of companies questioned had experienced …
Dangerous phishing attack targeting clients of Barclays Bank
After yesterday’s warning from PandaLabs about BarcPhish (a mass-mailed phishing attack), the antimalware laboratory now reports that the attack is continuing, with a 1 …
Don't miss
- Contextal Platform: Open-source threat detection and intelligence
- Using cognitive diversity for stronger, smarter cyber defense
- Microsoft fixes actively exploited Windows Hyper-V zero-day flaws
- Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)
- Malicious actors’ GenAI use has yet to match the hype