Please turn on your JavaScript for this page to function normally.
Survey reveals link between privileged users and breaches

Imperva announced that key findings in a new independent benchmark report conducted by Aberdeen Group reveal that monitoring privileged database users significantly reduces …

European mobile operators aren’t protecting users against spam

Cloudmark announced the results of a recent survey, which finds that 100 percent of the top 12 mobile operators in Europe anticipate mobile spam volumes to rise as adoption of …

Consumers trust biometrics for data protection

More than two-thirds (67 percent) of consumers surveyed around the world trust fingerprint scans to verify their identities with banks, government agencies and other …

New AirMagnet Survey features help optimize Voice-Over-WLAN

AirMagnet announced new features for AirMagnet Survey that enhanced its ability to help customers optimize their voice-over-WLAN (VoWLAN) deployments for Cisco and Vocera …

Enterprise-wide approach improves financial crime fighting performance

Research among international financial services organizations undertaken by Norkom Technologies reveals that those who have adopted an enterprise-wide approach to the …

2009 IT security forecast

As 2008 – a year in which a record number of data breaches occurred and over 22 million records were compromised – comes to a close, Utimaco has unveiled the top …

Enhanced line of Sun Fire x64 servers and Sun Blade systems

Sun Microsystems announced an enhanced line of Sun Fire x64 servers and Sun Blade systems that deliver up to 35 percent better performance over previous generations. With the …

Cybercriminals use Flash ads for distributing malicious code

Finjan announced the latest findings by its Malicious Code Research Center (MCRC) indentifying and analyzing the latest trends in cybercrime. Cybercriminals take advantage of …

Targets for malicious attacks in 2009

MX Logic published a list of New Year’s Resolutions that it predicts spammers to make this coming year. They are: 1. Harass users on Facebook, Twitter, MySpace and other …

Minimize your data loss even if .MDB databases are corrupt

DataNumen announced the release of Advanced Access Repair 2.0. If .MDB files are corrupt or damaged, this repair engine will recover the data at the maximum possibility. In …

Organizations struggle with push to encrypt personal data

In a move highlighting the necessity of strong data security regulations to ensure that businesses protect sensitive customer data, new laws beginning to take effect in …

Sophos report shames US for deluge of Internet attacks in 2008

Sophos has published its Security Threat Report 2009 examining the threat landscape over the last twelve months, and predicting emerging cybercrime trends for 2009. The Sophos …

Don't miss

Cybersecurity news