BlackBerry asset management, data protection and geolocation tracking
Absolute launched Computrace mobile for the BlackBerry platform, delivering asset management, data protection and geolocation tracking. After Computrace Mobile is installed …
NASA hacker denied UK trial
Are US authorities treating Gary McKinnon as a scapegoat, while other more serious cybercriminals escape and prove hard to catch? Earlier today, the British Crown Prosecution …
End-to-end protection and auditing for IBM mainframe databases
Imperva introduced SecureSphere Database Gateway for z/OS (DGZ), which monitors local and network activity by users and applications to prevent data loss, fraud, and automate …
Networking security appliances based on the Intel Q35 chipset
Acrosser Technology released the AR-R5700 Series of networking security appliances based upon the Intel Q35 chipset, capable of utilizing the Core2Quad, Core2Duo, and Celeron …
Flash Player update addresses security vulnerabilities
A potential vulnerability has been identified in Adobe Flash Player 10.0.12.36 and earlier that could allow an attacker who successfully exploits this potential vulnerability …
Data protection for mobile devices
Lumension announced it is extending data protection for Windows mobile devices with the introduction of Lumension Mobile, allowing organizations to centrally control and …
How to protect from man-in-the-middle attacks
In light of a new man-in-the-middle type of attack unveiled this week at Black Hat D.C., VeriSign provides simple tips for end users and businesses. The highlighted attack is …
D-Link unveils 802.11n dual-band wireless access point
D-Link is now shipping its latest 802.11n WLAN solution (DAP-2553). The high-speed AP includes integrated 802.3af PoE support, so the device can be mounted where power outlets …
Gmail users hit by phishing chat attack
Gmail users should be on their guard against phishing attacks following news that the email system has been the target of a campaign that spread via the Google Talk instant …
Excel vulnerability puts Macs to risk
Microsoft is investigating new public reports of a vulnerability in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel …
Sync your firewall configurations with Playbook
Matasano Chargen released Playbook 2.0, which makes it easier to manage your network’s firewall rules. It syncs your firewall configurations with a central web-based …
Juniper EX2500 ethernet switch for high-density 10GbE deployments
Juniper Networks announced the expansion of its Ethernet switching product portfolio with the EX2500 line of 10 Gigabit Ethernet (GbE) switch. The EX2500 line will be targeted …
Featured news
Sponsored
Don't miss
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes
- VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)