Please turn on your JavaScript for this page to function normally.
CA to acquire advanced authentication provider Arcot Systems

CA Technologies will acquire Arcot Systems, a provider of authentication and fraud prevention solutions in an all-cash transaction valued at $200 million. The acquisition of …

1 in 3 people think all websites pose a security threat

More than 1 in 3 people admit that when it comes to security, all websites are equally dangerous, all over the Internet, according to a survey by Avira. In the survey, a …

Travelers embrace smart cards

The increasing popularity of traveling has encouraged the large community of travelers to embrace technologies – such as smart card technology – that will simplify …

Misconfigured networks main cause of breaches

Responses to a survey from attendees of the DEFCON 18 conference revealed that 73% came across a misconfigured network more than three quarters of the time – which, …

India overtakes U.S. as biggest virus producer

India has overtaken the US as the single biggest producer of viruses, according to analysis of internet threats by Network Box. India is now responsible for 13.74 per cent of …

Wireshark 1.4.0 released

Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following features are new (or have been …

Mobile security cloud model

The first mobile security cloud model was introduced by NetQin Mobile today. The model is composed of three parts: A cloud security platform – knowledge repositories …

Ethical malcoders get their own conference

You have heard of Black Hat, Defcon, RSA Conference and Info Security, but does the name MalCon ring a bell? Probably not, since the newly started conference on malware is yet …

Rails 3.0 comes with XSS protection

After two years of development and 1600 contributors, Rails 3.0 has been released. The internet is a scary place and Rails 3 is watching out for you by default. Rails had CRSF …

New Netgear ProSecure appliance

Netgear introduced the ProSecure UTM50 Unified Threat Management Appliance (UTM50) which protects businesses from the growing number of virus and malware threats, dangerous …

Building secure web mashups

In this video from OWASP AppSec Research 2010, you can learn more about building secure web mashups.

Fake surveys harvest personal information

Gifts are often used as an incentive to make people share their personal information. Way back in the day, people could be convinced to share their password in return for a …

Don't miss

Cybersecurity news