Please turn on your JavaScript for this page to function normally.
IBM launches new data recovery center in Asia

IBM launched a Business Continuity and Resiliency Services (BCRS) center in Jakarta. This center offers a solution to help businesses keep their operations safe from any …

Read through a dozen of fresh Cisco Security Advisories

Cisco has just issued a huge list of security advisories dealing with security vulnerabilities in their products. Here you will find detailed technical information about the …

PGP encryption for mainframes

PGP Corporation announced a new version of PGP Command Line for IBM zSeries mainframes that now runs natively on the z/OS operating system.  This latest release of PGP …

Fake Norton Antivirus is really a trojan horse

Sophos warns of a fake anti-virus products, following the discovery of a malicious Trojan horse that is posing as a free copy of Norton AntiVirus 2008.  Google adverts are …

August 2008 was a nasty month for cyber-crime

August was the worst month on record for cyber-crime activity, according to managed security company, Network Box.  The company’s alert status, which measures the …

Lack of awareness of privacy and security software

A survey conducted by Steganos, a provider of privacy software to more than two million consumers and SMEs worldwide, has found that many users are woefully unaware of the …

Sophos new WebAlert service explained with children’s toys

Sophos is offering customers a new alert service, called Sophos WebAlert, to warn administrators of malicious code being hosted on their websites. Sophos monitors your website …

BullGuard Internet Security 8.5 released

New BullGuard Internet Security 8.5 incorporates advanced Antivirus, Antispyware, Firewall, Spamfilter and Backup functionalities and provides home users with an …

New defense for DNS cache poisoning threat

NitroSecurity has developed a unique IPS solution that virtually eliminates the threat of DNS cache poisoning. Through research with the Rochester Institute of Technology …

IBM pushes for preemptive approach to Web application security

With more services moving online, the cost of recovering from a security breach can reach into the hundreds of millions of dollars. In addition, ensuring compliance with …

The power of distributed Wi-Fi encryption

Xirrus asserts the importance of line-rate Wi-Fi encryption at the network edge to support non-compromised Wi-Fi performance. The rollout of 802.11n – which brings a 6X …

Enterprise-grade password management solution

Cloakware announced the immediate availability of Cloakware Password Authority 4.0, the only enterprise-grade solution to automate the lifecycle management of privileged …

Don't miss

Cybersecurity news