Please turn on your JavaScript for this page to function normally.
Top searches in Google Trends Labs used for malware

Webroot has detected a new technique being used by hackers to lure PC users to fake blog sites containing malware. For the first time, hackers are capitalizing on the top news …

New book: “Mac OS X for Unix Geeks, 4th Edition”

If you’re a developer or system administrator lured to Mac OS X because of its Unix roots, you’ll quickly discover that performing Unix tasks on a Mac is different …

RFID moving into the data center

IT managers are increasingly finding value in using RFID within their own IT operations. This is spurring adoption of RFID in data centers and across corporate campuses, …

Be prepared with a recovery plan that works

SecureWorks is advising organizations to be proactive at protecting their information technology assets in case they are faced with a natural or man-made disaster. This means …

Secure access to Lotus Notes and Domino from iPhone

IBM announced an expansion of its Lotus Notes and Domino collaboration flagship software to new markets and users with a new version that delivers higher levels of mobility …

Motorola completes acquisition of AirDefense

Motorola announced the completion of its acquisition of WLAN security provider AirDefense. As

Green SSL VPN series

Array Networks expanded its power-efficient, green SPX series (1800, 2800, 4800, 5800, 6800). The new SPX series offers flexible remote identity-based access to enable a range …

New computer forensics training courses

NetSecurity Corporation expanded its portfolio of Hands-On How-To security courses to include computer forensics training classes. NetSecurity’s Hands-On How-To courses, …

OpenSSO Enterprise – Sun’s next-gen secure web services solution

Sun Microsystems announced Sun OpenSSO Enterprise software, the first open, high-performance and unified solution for access management, federation and secure Web services …

Security software is a necessary nuisance

Latest survey done by Trend Micro found that for most consumers, Internet security software is like tedious dental visits — compulsory, but needed. Memory consumption …

TJX data theft conspirator pleads guilty

A Miami, Florida man was convicted in federal court of conspiring to electronically break into corporate computer networks, download customers’ credit and debit card …

New book: “Googling Security”

Googling Security is the first book to reveal how Google’s vast information stockpiles could be used against you or your business-and what you can do to protect …

Don't miss

Cybersecurity news