Is it possible for data to be both anonymous and useful?
The hoarding of data by companies is usually accompanied by the assurance that all the obvious identifiers (name, address, Social Security number) have been deleted – …
Cyber security exercises prepare you to deal with security threats
Cyber security attacks against public and private information technology and networks are escalating in occurrence and complexity. Those intent on causing harm never cease in …
Gemalto acquires Trusted Logic
Gemalto announced that it has completed the acquisition of Trusted Logic from its founders and other shareholders. Gemalto, which already held 32% of the shares, aims with …
Microsoft releases five security bulletins for Windows
It’s time for a summer Patch Tuesday and Microsoft delivers a variety of patches that fix vulnerabilities targeting Windows. Vulnerability in JScript scripting engine …
EasyPeasy 1.5 released
EasyPeasy is an operating system optimized for netbooks. Version 1.5 is built off Ubuntu 9.04. New in this release: Linux kernel 2.6.30 optimized for netbooks with faster …
Gartner: Security software and services budgets to increase in 2010
Security software and services spending will outpace other IT spending areas in 2010, according to a new survey by Gartner. Security software budgets are expected to grow by …
Host-based IDS OSSEC 2.2 released
The OSSEC team is pleased to announce the general availability of OSSEC version 2.2. This new version is the first one with support for centralized configurations and realtime …
WordPress worm: upgrading is vital
WordPress warns that a worm has been making the rounds of the old versions of its platform. Blog writers who didn’t get around to upgrading their versions remained …
SaaS vulnerability scanning for internal networks
Comodo introduces vulnerability scanning for internal networks in the cloud with the newest release of its HackerGuardian. Previously, internal network scans required …
F-Secure Internet Security 2010 pre-installed on Nokia Booklet 3G
F-Secure and Nokia are extending their collaboration to include Internet security on computers. Owners of the Nokia Booklet 3G mini-laptop get a free 30-day trial version of …
Encrypted mobile phone calls from anywhere
Cellcrypt Mobile is now available over Inmarsat‘s broadband satellite services, enabling encrypted voice calls to be made on popular smartphones from anywhere for the …
OpenLR: Opens source dynamic location referencing technology
TomTom developed a dynamic location referencing technology as an open standard for the navigation, mapping and ITS Industry, called OpenLR. OpenLR has been designed for …