AVG acquires Sana Software
AVG Technologies announced the acquisition of Sana Security, a developer of identity theft prevention software. Sana’s forward-looking technology in the industry comes …
Novell Access Manager now with built-in support for WS-Federation
Novell Access Manager 3.1 now offers built-in support for WS-federation, a single sign-on feature typically offered in costly, supplementary federated identity products. …
TRENDnet TEW-673GR: 300Mbps concurrent dual-band wireless N gigabit router
TRENDnet launched the high-performance 300Mbps Concurrent Dual-Band Wireless N Gigabit Router, model TEW-673GR. Built for extreme performance with an Atheros chipset, it …
New CompTIA Network+ certification exam
The Computing Technology Industry Association (CompTIA) announced today the availability of a new CompTIA Network+ exam that reflects the evolution of today’s data and …
Conficker worm variants are infecting thousands of computers
PandaLabs issued an orange alert warning against the malicious Conficker worm, a new family of computer worm that has already infected thousands of computers worldwide. …
IT security spending will increase to match cybercrime threat in 2009
In light of the economic downturn and rising cybercrime attacks as indicated in Finjan’s Web Security Trends Report Q4 2008, Finjan conducted an online survey among 200 …
Huge interest in wireless LAN deployment expansion
AirMagnet released the results of a new research survey that found more than 92 percent of those surveyed plan to extend their WLAN deployments in 2009 despite the current …
Performance management of financial networks with Cronos
ClearSight Networks released Cronos, a vendor-neutral monitoring, analysis, reporting and alerting solution designed to meet the stringent requirements of applications and …
CWE/SANS top 25 most dangerous programming errors
Today in Washington, DC, experts from more than 30 US and international cyber security organizations jointly released the consensus list of the 25 most dangerous programming …
Closer look on the spam URL TLD distribution
ICANN stipulates that all domains must be connected to a registrar, and all applications for domain names must be submitted through a registrar. Today there are hundreds of …
Spammers aren’t finished with Obama just yet
As Inauguration Day approaches, President-elect Obama’s desk is full of important tasks. Among these tasks is the promise he made to his daughters to provide them with a …
Spam stats for January: origins, categories and percentage
Worldwide Internet Mail Gateway Spam Percentage represents the number of messages that were processed and classified as spam versus the total number of messages processed when …
Featured news
Sponsored
Don't miss
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes
- VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)
- Review: Action1 – Simple and powerful patch management
- Securing remote access to mission-critical OT assets