Please turn on your JavaScript for this page to function normally.
Cyber security exercises prepare you to deal with security threats

Cyber security attacks against public and private information technology and networks are escalating in occurrence and complexity. Those intent on causing harm never cease in …

Gemalto acquires Trusted Logic

Gemalto announced that it has completed the acquisition of Trusted Logic from its founders and other shareholders. Gemalto, which already held 32% of the shares, aims with …

Microsoft releases five security bulletins for Windows

It’s time for a summer Patch Tuesday and Microsoft delivers a variety of patches that fix vulnerabilities targeting Windows. Vulnerability in JScript scripting engine …

EasyPeasy 1.5 released

EasyPeasy is an operating system optimized for netbooks. Version 1.5 is built off Ubuntu 9.04. New in this release: Linux kernel 2.6.30 optimized for netbooks with faster …

Gartner: Security software and services budgets to increase in 2010

Security software and services spending will outpace other IT spending areas in 2010, according to a new survey by Gartner. Security software budgets are expected to grow by …

Host-based IDS OSSEC 2.2 released

The OSSEC team is pleased to announce the general availability of OSSEC version 2.2. This new version is the first one with support for centralized configurations and realtime …

WordPress worm: upgrading is vital

WordPress warns that a worm has been making the rounds of the old versions of its platform. Blog writers who didn’t get around to upgrading their versions remained …

SaaS vulnerability scanning for internal networks

Comodo introduces vulnerability scanning for internal networks in the cloud with the newest release of its HackerGuardian. Previously, internal network scans required …

F-Secure Internet Security 2010 pre-installed on Nokia Booklet 3G

F-Secure and Nokia are extending their collaboration to include Internet security on computers. Owners of the Nokia Booklet 3G mini-laptop get a free 30-day trial version of …

Encrypted mobile phone calls from anywhere

Cellcrypt Mobile is now available over Inmarsat‘s broadband satellite services, enabling encrypted voice calls to be made on popular smartphones from anywhere for the …

OpenLR: Opens source dynamic location referencing technology

TomTom developed a dynamic location referencing technology as an open standard for the navigation, mapping and ITS Industry, called OpenLR. OpenLR has been designed for …

SCALE 8X Call For Papers now open

The 8th Annual Southern California Linux Expo scheduled for February 19-21 2010 is taking place at the Westin Hotel near Los Angeles International Airport. SCALE 8x will have …

Don't miss

Cybersecurity news