Please turn on your JavaScript for this page to function normally.
Patch assessment and remediation of your complete virtual world

Shavlik Technologies announced the availability of Shavlik NetChk Protect 6.5. Shavlik NetChk Protect 6.5 is the industry’s first virtual machine management solution …

Combat rising risk in virtualized environments

BMC Software announced a comprehensive virtualization management approach, including nine new, integrated solutions specifically designed to help customers eliminate the …

Data leakage prevention for Windows

Applied Security launched fideAS 3.3, a data leakage prevention solution. Designed to protect and secure access to sensitive data on fileservers, desktops and laptops by …

ENISA publishes updated awareness guide

The European Network and Information Security Agency, i.e. the EU Agency ENISA’s Guide to best practices in Awareness Raising is one of the Agency’s most highly …

High-speed gigabit IP network equipment LSI

Oki has developed a low power consumption gigabit high-speed network processor, the “ML7240,” for the network equipment (i.e. Home/SOHO routers) market. ML7240 …

Weekly malware report: keylogger, autorun worm and exchanger trojan

This week’s PandaLabs report looks at the Autorun.ADF worm, and the KeyLogger.E and Exchanger.AH Trojans. Autorun.ADF reaches computers in an attachment called “MY …

Browser privacy in Internet Explorer 8 Beta

With the new beta of Internet Explorer 8, Microsoft introduced InPrivate Browsing which helps prevent your browsing history, temporary Internet files, form data, cookies, and …

Researchers’ new algorithm significantly boosts routing efficiency of networks

A new algorithm developed by computer scientists at the University of California, San Diego helps answer that question, at least for computer networks, and it promises to …

Logitech video security cameras available in Europe

Logitech announced the company’s video security cameras are now available in Europe for the first time. Both PC-based security cameras feature do-it-yourself (DIY), …

New book: “High Performance MySQL, Second Edition”

The new edition of High Performance MySQL teaches advanced techniques in depth so readers can bring out MySQL’s full power. Readers can learn how to design schemas, …

SSH key-based attacks

US-CERT is aware of active attacks against Linux-based computing infrastructures using compromised SSH keys. The attack appears to initially use stolen SSH keys to gain access …

A third of IT staff snoop at confidential data

Exercise extreme caution when it comes to dismissing employees with knowledge of your IT systems. Cyber-Ark’s annual survey around “Trust, Security & …

Don't miss

Cybersecurity news