Fake Norton Antivirus is really a trojan horse
Sophos warns of a fake anti-virus products, following the discovery of a malicious Trojan horse that is posing as a free copy of Norton AntiVirus 2008. Google adverts are …
August 2008 was a nasty month for cyber-crime
August was the worst month on record for cyber-crime activity, according to managed security company, Network Box. The company’s alert status, which measures the …
Lack of awareness of privacy and security software
A survey conducted by Steganos, a provider of privacy software to more than two million consumers and SMEs worldwide, has found that many users are woefully unaware of the …
Sophos new WebAlert service explained with children’s toys
Sophos is offering customers a new alert service, called Sophos WebAlert, to warn administrators of malicious code being hosted on their websites. Sophos monitors your website …
BullGuard Internet Security 8.5 released
New BullGuard Internet Security 8.5 incorporates advanced Antivirus, Antispyware, Firewall, Spamfilter and Backup functionalities and provides home users with an …
New defense for DNS cache poisoning threat
NitroSecurity has developed a unique IPS solution that virtually eliminates the threat of DNS cache poisoning. Through research with the Rochester Institute of Technology …
IBM pushes for preemptive approach to Web application security
With more services moving online, the cost of recovering from a security breach can reach into the hundreds of millions of dollars. In addition, ensuring compliance with …
The power of distributed Wi-Fi encryption
Xirrus asserts the importance of line-rate Wi-Fi encryption at the network edge to support non-compromised Wi-Fi performance. The rollout of 802.11n – which brings a 6X …
Enterprise-grade password management solution
Cloakware announced the immediate availability of Cloakware Password Authority 4.0, the only enterprise-grade solution to automate the lifecycle management of privileged …
McAfee to acquire Secure Computing
McAfee, Inc. announced the execution of a definitive merger agreement to acquire Secure Computing Corporation for $5.75 per common share in cash, without interest, …
Malicious obfuscated code evolution
Finjan announced that its Malicious Code Research Center (MCRC) discovered examples of obfuscated code embedded in rich-content files, and not only in HTML-webpages on …
Patent on PKI certificate technology
SSH Communications Security, a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell …
Featured news
Sponsored
Don't miss
- The number of Android memory safety vulnerabilities has tumbled, and here’s why
- New MIT protocol protects sensitive data during cloud-based computation
- AI use: 3 essential questions every CISO must ask
- Compliance management strategies for protecting data in complex regulatory environments
- Rethinking privacy: A tech expert’s perspective