Study: Companies willing to switch backup vendors for integrated recovery management
CA announced the results of a global study indicating that while most enterprise and SMB IT organizations are satisfied with their current backup product, 70% of them would …
Spyware rose 10% in Q1 2009
According to the PandaLabs malware report for the first quarter of 2009, Trojans have accounted for 73% of all new malware created during this period. Nevertheless, one of the …
Economic crisis increases Americans’ fears about fraud and ID theft
According to research conducted in late February by Unisys, the vast majority of Americans (nearly 75 percent) believe that the current world financial crisis has increased …
Fortify Software delivers governance to software security
Fortify announced the latest release of its software security suite, Fortify 360, as well as its first-ever hosted software security solution, Fortify Vendor Security …
Unbrowse SNMP reaches version 1.5.1
Unbrowse is a handy tool if you are working with the SNMP (Simple Network Management Protocol). In addition to a powerful MIB compiler, and browser – it also features …
Survey shows teens would spy on people online for money
A survey by Trend Micro suggests that British teens might be tempted by illegal online methods to make money. One in three teens (aged 12 – 18) admitted they would …
Integrate smart cards and biometrics for Windows
Gemalto introduced an innovative solution which enables organizations to enhance network security and protect online identities by replacing weak, static passwords with strong …
New book: “Advanced Software Testing, Vol. 2”
Advanced Software Testing, Vol. 2 teaches test managers what they need to know to achieve advanced skills in test estimation, test planning, test monitoring, and test control. …
New HP ProLiant G6 server line
HP introduced the new HP ProLiant G6 server line, which delivers double the performance of previous generations. The HP ProLiant G6 line’s advances in energy efficiency, …
Microsoft releases Windows Server 2008 Foundation
Microsoft today released Windows Server 2008 Foundation. Built for small businesses with 15 or fewer users, it can be used with single or multiple workloads, such as file …
Video: Dissecting the Conficker worm
Wolfgang Kandek, CTO of Qualys, talks about the Conficker worm. A Conficker removal tool is available for download here.
How to exploit the SIP Digest Leak vulnerability
The SIP Digest Leak is a vulnerability that affects a large number of SIP Phones, including both hardware and software IP Phones as well as phone adapters (VoIP to analogue). …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes