Please turn on your JavaScript for this page to function normally.
PayPal joins OpenID foundation board

The OpenID Foundation announced the addition of PayPal as a sustaining corporate member of the board. PayPal selected Andrew Nash, Sr. Director of Information Risk Management …

New version of iServices Trojan now in pirated Adobe Photoshop CS4

Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse, OSX.Trojan.iServices.B, like the …

Fraud costs rise, challenging online businesses

Fraud is taking a bigger bite out of UK online revenues according to the figures come from a survey of 150 online merchants undertaken by CyberSource. One in eight businesses …

Fujitsu develops HDD security technology based on Opal SSC standards

Fujitsu announced the development of new security technology to make its 2.5-inch encrypted hard disk drives support the Opal Security Subsystem Class (Opal SSC). Opal SSC is …

2008 spam lessons learned: “Stop the guns, not just the bullets”

Marshal8e6, a provider of web and email security products, released its TRACE report for the second half of 2008 which finds that while global spam volumes continued to …

NetMRI 3.0 introduces impact analysis to Network Configuration and Change Management

NetMRI 3.0 solves the number-one challenge that undermines network performance and policy compliance – internal changes to the network, whether malicious or inadvertent …

Mac theft recovery application Undercover now with location tracking

Orbicule announced the integration of Wi-Fi Positioning software from Skyhook Wireless into Undercover, a theft-recovery application that can track any stolen Mac. Undercover …

Positive financial results from Check Point Software

Positive financial results are not so common these days, so let us briefly cover that Check Point Software reported record fourth quarter and fiscal year 2008 numbers. Here …

VoIP service providers not focusing on impending threats

As the VoIP market evolves, security threats loom on the horizon. However, service providers are not seemingly taking the necessary actions to prepare for the impending …

Backup and disaster recovery for virtual environments with Arkeia Network Backup 8

Arkeia Software released Arkeia Network Backup 8 which delivers the first true virtual appliance for backup that gives customers free choice of hardware. The Arkeia Virtual …

Most SharePoint users are inadequately protected

A survey conducted by Osterman Research and commissioned by Trend Micro of 269 IT managers involved in overseeing the messaging and collaboration infrastructure of their …

Commex HTX-based content-aware 10GbE network adaptor – Vulcan SE HT6210

Commex Technologies announced its Vulcan SE HT6210 content-aware dual-channel 10GbE Network Interface Card (NIC) for the HP ProLiant DL785 G5 server which connects the network …

Don't miss

Cybersecurity news