SmartWorkflow: New security management software blade
Check Point announced SmartWorkflow, a new security management software blade that provides customers the option of extending their security infrastructure with policy change …
New book: “Web 2.0 Architectures”
Web 2.0 is more pervasive than ever, but business analysts and technologists are still struggling to comprehend what it can offer them. So what exactly is it–a marketing …
New Trojan variants evade major anti-virus engines
Millions of e-mail viruses bypassed major anti-virus engines during the second half of the second quarter, according to the Q2 2009 Internet Threats Trend Report by Commtouch. …
Spam now represents 90 percent of inbound email
Marshal8e6 released its bi-annual TRACElabs report detailing the latest spam and exploit levels. From January to June 2009, they observed a staggering 60 percent increase in …
Vulnerability in Microsoft Office Web Components
Microsoft is investigating a vulnerability in Microsoft Office Web Components. An attacker who successfully exploited this vulnerability could gain the same user rights as the …
The most physically and cryptographically secure USB flash drive
IronKey launched its S200 device for government and enterprise customers, featuring hardened physical security, the latest Cryptochip technology, active anti-malware and …
Organizations unprepared for iPhone security threat
A new survey conducted by Vanson Bourne reveals that companies are failing to appreciate the risks attached to iPhone use among employees. The survey quizzed senior IT …
FreeNOS: Experimental microkernel operating system
FreeNOS is an experimental microkernel operating system for learning purposes, licensed under the GPLv3. Version 0.0.3 includes a new filesystem written from scratch: LinnFS. …
FreeBSD 8.0 Beta 1 is now available
The first public test build of the FreeBSD 8.0-RELEASE test cycle is now available, 8.0-BETA1. At this point the beta is not quite ready for production systems but mostly …
New book: “Regular Expressions Cookbook”
Every programmer can find uses for regular expressions, but their power doesn’t come worry-free. Even seasoned users often suffer from poor performance, false positives, …
WordPress 2.8.1 released
WordPress 2.8.1 fixes many bugs and tightens security for plugin administration pages. Core Security found that admin pages added by certain plugins could be viewed by …
Sober worm returns and uses social engineering techniques
PandaLabs has recorded the appearance of a new variant of the Sober worm, Sober.Y, which spreads using social engineering techniques in emails sent in English or German. The …