Please turn on your JavaScript for this page to function normally.
AVG acquires Sana Software

AVG Technologies announced the acquisition of Sana Security, a developer of identity theft prevention software. Sana’s forward-looking technology in the industry comes …

Novell Access Manager now with built-in support for WS-Federation

Novell Access Manager 3.1 now offers built-in support for WS-federation, a single sign-on feature typically offered in costly, supplementary federated identity products. …

TRENDnet TEW-673GR: 300Mbps concurrent dual-band wireless N gigabit router

TRENDnet launched the high-performance 300Mbps Concurrent Dual-Band Wireless N Gigabit Router, model TEW-673GR. Built for extreme performance with an Atheros chipset, it …

New CompTIA Network+ certification exam

The Computing Technology Industry Association (CompTIA) announced today the availability of a new CompTIA Network+ exam that reflects the evolution of today’s data and …

Conficker worm variants are infecting thousands of computers

PandaLabs issued an orange alert warning against the malicious Conficker worm, a new family of computer worm that has already infected thousands of computers worldwide. …

IT security spending will increase to match cybercrime threat in 2009

In light of the economic downturn and rising cybercrime attacks as indicated in Finjan’s Web Security Trends Report Q4 2008, Finjan conducted an online survey among 200 …

Huge interest in wireless LAN deployment expansion

AirMagnet released the results of a new research survey that found more than 92 percent of those surveyed plan to extend their WLAN deployments in 2009 despite the current …

Performance management of financial networks with Cronos

ClearSight Networks released Cronos, a vendor-neutral monitoring, analysis, reporting and alerting solution designed to meet the stringent requirements of applications and …

CWE/SANS top 25 most dangerous programming errors

Today in Washington, DC, experts from more than 30 US and international cyber security organizations jointly released the consensus list of the 25 most dangerous programming …

Closer look on the spam URL TLD distribution

ICANN stipulates that all domains must be connected to a registrar, and all applications for domain names must be submitted through a registrar. Today there are hundreds of …

Spammers aren’t finished with Obama just yet

As Inauguration Day approaches, President-elect Obama’s desk is full of important tasks. Among these tasks is the promise he made to his daughters to provide them with a …

Spam stats for January: origins, categories and percentage

Worldwide Internet Mail Gateway Spam Percentage represents the number of messages that were processed and classified as spam versus the total number of messages processed when …

Don't miss

Cybersecurity news