Please turn on your JavaScript for this page to function normally.
New book: “SQL and Relational Theory”

SQL is ubiquitous, but it’s hard to use. “It’s complicated, confusing, and error prone—much more so, I venture to suggest, than its apologists would have …

The environmental impact of spam

McAfee announced new research findings that reveal spam e-mail is not only a nuisance, but is damaging to the environment and substantially contributes to green house gas …

Verizon study finds significant rise in targeted attacks

More electronic records were breached in 2008 than the previous four years combined, fueled by a targeting of the financial services industry and a strong involvement of …

New OS for securing corporate information on enterprise networks from Alcatel-Lucent

Alcatel-Lucent announced a new operating system including an advanced set of features that enable IT departments to quickly and easily secure their network and unify access …

Threat report finds malicious activity continues to grow at a record pace

Symantec announced that malicious code activity continued to grow at a record pace throughout 2008, primarily targeting confidential information of computer users. According …

Gartner: Phishing attacks on U.S. consumers increased 40 percent in 2008

More than 5 million U.S. consumers lost money to phishing attacks in the 12 months ending in September 2008, a 39.8 percent increase over the number of victims a year earlier, …

Samsung PropelPro: a sliding smartphone with support for security

The Propel Pro, the next generation smartphone from Samsung Mobile, is a compact slider that opens to reveal a full QWERTY keyboard that makes sending text messages and …

HITBSecConf2009 Malaysia: Call for Papers now open

The Call for Papers (CFP) for the 7th Hack in The Box Security Conference to be held in Malaysia is now open. The event will run from the 5th till the 8th of October and CFP …

Independent survey finds enterprises at-risk from insecure software

Veracode announced the findings of an independent commissioned study conducted by Forrester Consulting – Application Risk Management in Business Survey. The survey …

Sun unveils blades architecture with new networking, manageability, cooling management

Sun Microsystems launched new products and technologies that span the data center and include a new blades architecture, new networking technologies and seven new systems …

Spending on information security to increase?

A survey by Infosecurity Europe has found that spending on Information security is likely to increase according to 55% of the 1010 respondents they asked and 34% expected …

Many computers still not patched against Conficker vulnerability

Research shows many PCs are still not patched against Conficker. The data comes from Sophos’s Endpoint Assessment Test, a free tool that scans a computer and assesses …

Don't miss

Cybersecurity news