Please turn on your JavaScript for this page to function normally.
Appliance for large-scale surveillance environments

Pivot3 announced the expansion of its vSTAC Watch product line with the introduction of the vSTAC Watch Enterprise, an enterprise-class Serverless Computing solution that …

AuthenTec combines fingerprint security with Symantec VIP

AuthenTec’s Eikon Digital Privacy Manager now comes pre-configured with Symantec Validation and ID Protection Service (VIP). The addition of Symantec VIP to Eikon …

Next Level Security Systems releases mobile apps

Next Level Security Systems released the NLSS Gateway 2.3, a new version of the NLSS Gateway that includes the power of a customized management tool, and NextMobile, a mobile …

Cisco and Lumos Networks prepare fiber infrastructure for 100G network

Lumos Networks, a fiber-based service provider, has successfully completed a technology test of Cisco’s 100G coherent DWDM solution across its service area. This …

How much does a 0-day vulnerability cost?

The market for exploits for zero-day vulnerabilities has exploded in the last year, says Adriel Desautels, the founder of Netragard, a penetration testing and vulnerability …

Fake eBay identity confirmation message hitting inboxes

Ebay users are once again targeted with fake notifications asking them to “confirm their identity”. “Dear eBay Community Member, You’re signing in from …

Facebook users targeted with account-hijacking Chrome extensions

With the steady rise in popularity of both Facebook and Google’s Chrome browser, cyber scammers have turned to targeting users of both. According to Kaspersky Lab expert …

Open source audit plug-in for MySQL

McAfee announced a free open source audit plug-in for MySQL database users to capture complete detailed activity audits from their databases. The plug-in was created and …

New cloud disaster recovery service

EVault announced a four-hour option for its Cloud Disaster Recovery Service (EVault CDR) with a guaranteed SLA. The EVault CDR four-hour managed service includes an SLA-backed …

Exploiting legitimate online technology

Criminals intent on distributing images of children being sexually abused are finding new ways of exploiting legitimate online technology, according to the Internet Watch …

Data center industry dynamics

While interest around data center services (DCS) is extremely high, the market structure, dynamics and maturity differ across the world, according to Gartner. The shift toward …

Microsoft disrupts massive cybercrime operation

In its most complex effort to disrupt botnets to date, Microsoft, in collaboration with the financial services industry — including the Financial Services – Information …

Don't miss

Cybersecurity news