Intel and Nokia partner for an open mobile computing platform
Further uniting the Internet with mobile phones and computers, Intel and Nokia announced a long-term relationship to develop a new class of Intel Architecture-based mobile …
New version of IBM Tivoli Identity Manager
The new version of IBM Tivoli Identity Manager has operational role management capabilities that help organizations manage user access as part of their business and risk …
Survey shows concern about mobile device security
The results of a survey by Harris Interactive found that nearly two thirds of mobile device owners are concerned about the security of their devices. The survey, which polled …
Five plead guilty in a multi-million e-mail stock fraud scheme
Five individuals pleaded guilty today in federal court in Detroit for their roles in a wide-ranging international stock fraud scheme involving spamming. Alan M. Ralsky, 64, …
Affiliate fraud cybersquatting model more lucrative than pay-per-click
While pay-per-click (PPC) sites remain a large part of the cybersquatting business model, there is another wave of massive-scale online infringement monetization called …
OESISOK Interoperability Certification Program expands to three levels
OPSWAT today announced three distinct levels of its OESISOK Interoperability Certification Program to verify that specific security applications operate with network devices. …
Elcomsoft is conducting a password usage behavior survey
Elcomsoft is a company well-known for their password recovery products. In the recent past they’ve been in the news for criticizing Adobe Acrobat 9 security as well as …
Facebook fixes privacy bug
Although Facebook is supposed to have clear privacy restrictions, it appears that a loophole has been identified. FBHive reported the following: “With a simple hack, …
12 requirements for next generation network access technology
NCP engineering has developed a blueprint for next generation network access technology. The roadmap details the 12 essential components organizations need to secure their …
New Seagate BlackArmor external storage solutions
Seagate announced the BlackArmor NAS 220 storage server, the BlackArmor WS 110 external drive workstation and the BlackArmor PS 110 portable drive. With features like …
OWASP Joomla vulnerability scanner
Joomla! is one of the most widely-used content management systems. Watching its vulnerabilities can be a daunting taks. JoomScan can help web developers identify possible …
Survey: 20% of IT security professionals cheat on audits
A survey of IT security managers and technical staff has revealed that 20% admit to cheating on an audit to get it passed. The survey by Tufin was conducted amongst 151 IT …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption