Please turn on your JavaScript for this page to function normally.
Critical infrastructure is not prepared for cyber attacks

Secure Computing announced the results of a study conducted during August and September 2008 in the US, Canada and Europe. The study surveyed 199 international security …

Automated information management in cloud storage environments with EMC Atmos

EMC announced its first cloud infrastructure offering, EMC Atmos, the first multi-petabyte information management solution designed to help customers automatically manage and …

Meru Networks brings virtualization to wireless LANs

Meru Networks has brought the techniques of virtualization to its enterprise wireless LAN products, allowing an optimization of radio frequency (RF) resources that raises WLAN …

eEye bulnerability assessment via SaaS Model

eEye Digital Security announced the availability of Retina OnDemand, which provides network security via the Software-as-a-Service (SaaS) model. By using the SaaS model, …

Nigerian 419 scammers use Facebook friends to steal money

According to reports, Google Australia employee, Karina Wells, received a Facebook message from a cyber crook pretending to be her friend Adrian saying he was stranded in …

Former inmate hacked prison computer to access prison management program

A former inmate of the Plymouth County Correctional Facility in Plymouth, Massachusetts was arrested late yesterday in North Carolina, on an Indictment charging him with …

Anti-Malware Testing Standards Organization publishes testing guidelines

Members of the Anti-Malware Testing Standards Organization (AMTSO) have published guidelines that, for the first time, set recognized standards for testing security software. …

Wireless surveillance proves security on presidential campaign trail

Amid week-long political conventions and massive campaign rallies, wireless video surveillance has emerged as an indispensable tool for law enforcement and public safety …

Remotely managed secure flash drives address multitude of security standards

Kanguru Solutions has added powerful new administrative tools to its Kanguru Remote Management Console, to help address government and enterprise security standards. These …

The increase of spam related to personal finance

PandaLabs announced research revealing overwhelming evidence that cybercriminals are adapting their messaging with changes in the economic landscape. Two weeks ago, PandaLabs …

Barack Obama used for a malware spam attack

Malware authors haven’t been slow reacting to the latest US elections news and President Elect Barrack Obama is already being used as a lure for infecting unsuspecting …

Man charged with providing data theft tool in national identity theft case

A New York man was charged in U.S. District Court with providing a sniffer program used to monitor and capture data including customers’ credit and debit card …

Don't miss

Cybersecurity news