Please turn on your JavaScript for this page to function normally.
Study: Companies willing to switch backup vendors for integrated recovery management

CA announced the results of a global study indicating that while most enterprise and SMB IT organizations are satisfied with their current backup product, 70% of them would …

Spyware rose 10% in Q1 2009

According to the PandaLabs malware report for the first quarter of 2009, Trojans have accounted for 73% of all new malware created during this period. Nevertheless, one of the …

Economic crisis increases Americans’ fears about fraud and ID theft

According to research conducted in late February by Unisys, the vast majority of Americans (nearly 75 percent) believe that the current world financial crisis has increased …

Fortify Software delivers governance to software security

Fortify announced the latest release of its software security suite, Fortify 360, as well as its first-ever hosted software security solution, Fortify Vendor Security …

Unbrowse SNMP reaches version 1.5.1

Unbrowse is a handy tool if you are working with the SNMP (Simple Network Management Protocol). In addition to a powerful MIB compiler, and browser – it also features …

Survey shows teens would spy on people online for money

A survey by Trend Micro suggests that British teens might be tempted by illegal online methods to make money. One in three teens (aged 12 – 18) admitted they would …

Integrate smart cards and biometrics for Windows

Gemalto introduced an innovative solution which enables organizations to enhance network security and protect online identities by replacing weak, static passwords with strong …

New book: “Advanced Software Testing, Vol. 2”

Advanced Software Testing, Vol. 2 teaches test managers what they need to know to achieve advanced skills in test estimation, test planning, test monitoring, and test control. …

New HP ProLiant G6 server line

HP introduced the new HP ProLiant G6 server line, which delivers double the performance of previous generations. The HP ProLiant G6 line’s advances in energy efficiency, …

Microsoft releases Windows Server 2008 Foundation

Microsoft today released Windows Server 2008 Foundation. Built for small businesses with 15 or fewer users, it can be used with single or multiple workloads, such as file …

Video: Dissecting the Conficker worm

Wolfgang Kandek, CTO of Qualys, talks about the Conficker worm. A Conficker removal tool is available for download here.

How to exploit the SIP Digest Leak vulnerability

The SIP Digest Leak is a vulnerability that affects a large number of SIP Phones, including both hardware and software IP Phones as well as phone adapters (VoIP to analogue). …

Don't miss

Cybersecurity news