Please turn on your JavaScript for this page to function normally.
RSA Conference Europe full keynote line-up

RSA Conference announced its complete line-up of keynote speakers for the 12th annual RSA Conference Europe, taking place from 11th-13th October 2011 in London. The Conference …

WAN and network optimization API for iOS

Circadence announced an application programming interface (API) enabling WAN optimization for Apple iOS applications. The API installs into Apple mobile applications or apps …

Thousands of sites compromised following hosting provider hack

California-based hosting provider InMotion has suffered a compromise that resulted in the defacement of thousands of home pages of websites hosted on their infrastructure, …

Firefox 7 search yields unwanted results

Firefox is the second most widely used browser in the world, so we can be sure that malicious individuals are already working on ways to take advantage of yesterday’s …

Kingston introduces new ultra-secure USB flash drive

Kingston Digital announced the DataTraveler 6000 (DT6000) USB Flash drive, which protects sensitive data with FIPS 140-2 Level 3 Validation and 100-percent encryption. For …

Payment card security compliance remains problematic

Too many businesses are struggling to comply with payment card security standards, putting consumers’ confidential information at risk. According to the Verizon Payment …

“ACH Payment Canceled” spam leads to malware

After a short pause, the failed/cancelled ACH transaction spam is hitting inboxes again. Since yesterday, Websense has intercepted over 200,000 of the following emails: The …

Microsoft takes down Kelihos botnet

After having disrupted the operation of the Waledac and Rustock botnets, Microsoft has set its sights on a smaller one that is thought to be an attempt to rebuild the Waledac …

10 actions to reduce IT infrastructure and operations costs

As many IT organizations are under intense pressure to continue to implement cost-cutting initiatives, Gartner has identified 10 actions that can reduce IT infrastructure and …

Multi-year study of real-world software security initiatives

The third major release of the “Building Security In Maturity Model” (BSIMM) study continues to add real-world data defining benchmarks for successfully developing …

IP Address Management platform Proteus 3.7 released

BlueCat Networks announced the latest release of Proteus, a scalable IP Address Management (IPAM) platform. Proteus 3.7 delivers enhanced usability, scalability, seamless …

Facebook allegedly promises to fix logout cookies issue

The Facebook tracking cookies issue revealed yesterday has, expectedly, created quite a stir in the security community. The company went into damage control mode and repeated …

Don't miss

Cybersecurity news