Self-encrypting drives based on Trusted Computing Group specifications
Hard drive vendors have started shipping self-encrypting drives based on the Trusted Computing Group’s specifications. Final specifications for client drives, data …
Nokia sponsored Maemo 5 SDK goes alpha
Nokia introduced the Maemo 5 Alpha SDK including the new UI framework and APIs for application development. The redesigned Maemo UI provides a simple and beautiful experience …
NSA Director to keynote at RSA Conference 2009
RSA Conference announced that the NSA Director Lieutenant General Keith B. Alexander will present at 11:30 a.m. PT on Tuesday, April 21, 2009. As the Director of NSA and Chief …
AppRiver adds Web filtering solution to its in-the-cloud security services
AppRiver launched SecureSurf Web Protection, which provides a combination of Web filtering and malware protection that can be deployed from a single PC to an entire enterprise …
Member of the botnet underground sentenced to 48 months in prison
Concluding the first prosecution of its kind in the nation, a man associated with the “botnet underground” was sentenced to 48 months in federal prison for using …
Twitter users hit by Chatwebcamfree attack
Twitter users should to be vigilant as approximately 750 accounts on the popular micro-blogging site have been hit by yet another hack attack. Experts at SophosLabs found that …
Dual segment 10 Gigabit intelligent bypass switch
Interface Masters Technologies unveiled the Niagara 2814 Intelligent Bypass which consists of dual 10Gb bypass segments which possess passive and active bypass switch …
Cost-effective single board computer from Axiomtek
Axiomtek has released its new cost-effective SBC81206 PICMG 1.0 PCI/ISA single board computer, based on the Mobile Intel 945GC Express chipset to support Intel Core 2 Duo …
New malware analysis technology improves threat detection
Sunbelt Software announced its new malware analysis technology, MX-Virtualization (“MX-V”), as part of a significant enhancement to its popular VIPRE Antivirus + …
Massive Twitter account hijacking spree
As posted by Rik Ferguson to Trend Micro’s CounterMeasure blog, it appears that there is a rash of Twitter account hijacking going on this evening. Hundreds of Twitter …
Secure data communication and protection for Windows Mobile
Certgate uveiled the Protector for Smart Phones, a hardware-based security solution for the protection of data and mobile communications. A smart card of the microSD type is …
iStockphoto struck by phishing attack
Popular stock photography website, iStockphoto, has been targeted by password thieves. According to a statement on the iStockphoto website, the phishing attack was perpetrated …