Jericho Forum and Cloud Security Alliance join forces to address cloud security
Jericho Forum, the high level independent security expert group, and the Cloud Security Alliance, a not-for-profit group of information security and cloud computing security …
Integrated protection for smartphones: Kaspersky Mobile Security 8.0
The new version of Kaspersky Mobile Security provides protection against the wide range of threats facing smartphone users. For instance, SMS Find can locate the exact …
IdentityRisk: A proactive identity protection solution
IdentityTruth introduced a new service – identityRisk Report – to enable businesses to provide their customers, users, and employees with a proactive identity …
Nessus 4.0.1 released
Tenable Network Security has released version 4.0.1 of the Nessus vulnerability scanner. This point release includes a variety of minor bug fixes as well as support for …
Mobile Admin gets Nagios monitoring and Symbian S60 support
Rove announced Mobile Admin 4.2 which now supports Nagios monitoring, the leading open-source system, network and application monitoring solution, and Symbian S60 smartphones. …
The Open Group Security Forum completes second phase of risk management project
The Open Group, a vendor- and technology-neutral consortium focused on open standards and global interoperability within and between enterprises, today announced that the …
New StoneGate FW-1030 appliance with firewall capabilities
Stonesoft introduced the new StoneGate FW-1030 appliance with firewall capabilities. This firewall solution provides data security for small enterprises and remote offices …
New line of security management appliances from Check Point
Check Point announced the Check Point Smart-1 security management appliance line. The new line of four appliances offer enterprises a solution that unifies network, IPS and …
Contest opens for Panda Global Protection 2010 beta testing
Panda Security released a beta version of Panda Global Protection 2010, it’s anti-malware suite for home users. Panda Global Protection 2010 includes improved detection …
Comments on 30,000 YouTube videos link to a malicious Web page
This is yet another example of how cyber-criminals are attacking popular Web 2.0 sites to distribute malware. Such attacks have previously been seen, to a lesser extent, on …
Video: The DEFCON Experience
This is a documentary about the experience of first-time DEFCON attendees from the University of Delaware. They traveled from Newark, DE to Las Vegas for DEFCON 16, gave a …
Anti-piracy solution maps route to unlicensed software
V.i. Laboratories upgraded its software anti-piracy platform with new features that help Independent Software Vendors (ISVs) quickly determine who is using their unlicensed …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul