Sniffer Global, a new software-based portable protocol analysis tool
The portable protocol analyzer remains a widely used front-line tool that helps to improve real-time troubleshooting with localized provisional visibility for today’s …
Security experts define new priorities for security standardization
Standardization of security aspects of Information and Communication Technologies (ICT) continues to be a topic that needs careful balance, according the findings of the …
10 Gb intelligent bypass introduced by Interface Masters
Interface Masters Technologies unveiled the Niagara 2812 whose state-of-the-art active bypass capabilities ensure maximum uptime on any network-critical link. During normal …
Damn Vulnerable Linux 1.5 is now available
Damn Vulnerable Linux (DVL) is meant to be used by both novice and professional security personnel and is even ideal for the Linux uninitiated. You can start learning IT …
Only 8.4% of email that reached companies in 2008 was non-malicious
PandaLabs revealed the results from its analysis on 430 million email messages from 2008 and discovered that only 8.4 percent of messages that reached companies were …
PayPal joins OpenID foundation board
The OpenID Foundation announced the addition of PayPal as a sustaining corporate member of the board. PayPal selected Andrew Nash, Sr. Director of Information Risk Management …
New version of iServices Trojan now in pirated Adobe Photoshop CS4
Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse, OSX.Trojan.iServices.B, like the …
Fraud costs rise, challenging online businesses
Fraud is taking a bigger bite out of UK online revenues according to the figures come from a survey of 150 online merchants undertaken by CyberSource. One in eight businesses …
Fujitsu develops HDD security technology based on Opal SSC standards
Fujitsu announced the development of new security technology to make its 2.5-inch encrypted hard disk drives support the Opal Security Subsystem Class (Opal SSC). Opal SSC is …
2008 spam lessons learned: “Stop the guns, not just the bullets”
Marshal8e6, a provider of web and email security products, released its TRACE report for the second half of 2008 which finds that while global spam volumes continued to …
NetMRI 3.0 introduces impact analysis to Network Configuration and Change Management
NetMRI 3.0 solves the number-one challenge that undermines network performance and policy compliance – internal changes to the network, whether malicious or inadvertent …
Mac theft recovery application Undercover now with location tracking
Orbicule announced the integration of Wi-Fi Positioning software from Skyhook Wireless into Undercover, a theft-recovery application that can track any stolen Mac. Undercover …