Please turn on your JavaScript for this page to function normally.
Internet Explorer 8 is now available

Microsoft unveiled Windows Internet Explorer 8, which can be downloaded in 25 languages. Microsoft claims IE 8 is easier to use, faster and offers security features in direct …

The most prominent types of Web application vulnerabilities

Cenzic released its report revealing the most prominent types of Web application vulnerabilities for the second half of 2008. The report, which comes in the wake of highly …

Man indicted for disabling offshore oil platform leak-detection system

A man who worked at a company that operated off-shore oil platforms was indicted on federal charges of damaging the company’s computer systems after it declined to offer …

Thunderbird 2.0.0.21 fixes security issues

Mozilla released Thunderbird 2.0.0.21 and the following security issues have been fixed. Upgrade PNG library to fix memory safety hazards Google security researcher Tavis …

Seven great concerns for CEOs in 2009

With CEOs facing unprecedented challenges ahead as businesses struggle with the realities of dealing with the economic downturn, Gartner, Inc. has identified the seven …

Imperva enhances database activity monitoring with analytics

Imperva announced a new version of its SecureSphere database activity monitoring (DAM) solution that adds analytics intelligence to automate forensic and audit investigations. …

Survey: Hosted email security can cut costs

Conducted by Osterman Research and commissioned by Trend Micro, a recent study found that more than 70 percent of respondents would consider hosted if it reduced their costs …

The security industry’s first collaborative open IP specification ratified

The Physical Security Interoperability Alliance (PSIA), an industry organization created to define, recommend and promote standards for IP-enabled security devices and …

Free tool helps you avoid malicious exploits

F-Secure data indicates that what is making computers most vulnerable to exploits are unpatched or out-of-date versions of the most widely-used software for PCs. Between …

Sun Microsystems unveils Open Cloud Platform

Sun Microsystems uveiled the Sun Open Cloud Platform, the company’s open cloud computing infrastructure, powered by industry-leading software technologies from Sun, …

Guidelines on unsafe cryptographic algorithms

Experts in the security community have indicted many commonly used cryptographic algorithms as insecure. Bases for these claims of insecurity often include advances in …

Survey unmasks the risk of data leaks and losses

More than half of UK public and private sector organisations are still risking data breaches and leaks, because they do not have data encryption in place to secure information …

Cybersecurity news