Please turn on your JavaScript for this page to function normally.
New book: “Cloud Computing: Implementation, Management, and Security”

Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, …

Apple Xsan 2.2 released

Apple today released version 2.2 of Xsan, its 64-bit cluster file system specifically designed for small and large computing environments. The problem fixed in Xsan 2.2 was …

PhoneCrypt now available for the iPhone

PhoneCrypt is a solution based in military grade encryption (RSA 4096 bits and AES 256 bits). It works in real time, without interfering in the functions of the mobile phone, …

Intrusion prevention for small and medium enterprises

TippingPoint introduced two new intrusion prevention systems designed to secure network traffic for small and medium enterprises. The TippingPoint 110 and TippingPoint 330 …

Enterprise Wi-Fi BlackBerry client

iPass launched Blackberry iPassConnect Client, an enterprise Wi-Fi client. The application works in conjunction with the BlackBerry Enterprise Server, giving IT administrators …

Video: Man busted installing ‘skimming’ device to ATM

Below is CCTV footage form Brazil.

Draft eSecurity code for improved net security

Australia’s Internet Industry Association (IIA) has released a draft eSecurity code to ISPs throughout the continent, to serve as a guide for improving net security. …

Tor for Android mobile devices

TorProxy is an Android application that makes it possible to use Internet sites and services anonymously from a mobile device. This is possible thanks to the Tor network and …

CA acquires NetQoS for $200 million

CA announced that it has signed a definitive agreement to acquire privately-held NetQoS Inc., a provider of network performance management and service delivery solutions, for …

2000% rise in NDR spam

In August 2009, PandaLabs recorded a 2000 percent increase in the amount of different NDR spam messages in circulation (compared to the number of samples detected between …

Symark acquires BeyondTrust and adopts company name

Symark announced the acquisition of BeyondTrust. The combined organization will operate under the name BeyondTrust, which reflects the company’s mission to provide a …

New SanDisk Flash memory cards for pros

SanDisk introduced a new line of SanDisk Extreme Pro CompactFlash memory cards designed for professional photographers. They feature a new SanDisk Power Core Controller, an …

Don't miss

Cybersecurity news