IBM launches new data recovery center in Asia
IBM launched a Business Continuity and Resiliency Services (BCRS) center in Jakarta. This center offers a solution to help businesses keep their operations safe from any …
Read through a dozen of fresh Cisco Security Advisories
Cisco has just issued a huge list of security advisories dealing with security vulnerabilities in their products. Here you will find detailed technical information about the …
PGP encryption for mainframes
PGP Corporation announced a new version of PGP Command Line for IBM zSeries mainframes that now runs natively on the z/OS operating system.  This latest release of PGP …
Fake Norton Antivirus is really a trojan horse
Sophos warns of a fake anti-virus products, following the discovery of a malicious Trojan horse that is posing as a free copy of Norton AntiVirus 2008. Google adverts are …
August 2008 was a nasty month for cyber-crime
August was the worst month on record for cyber-crime activity, according to managed security company, Network Box. The company’s alert status, which measures the …
Lack of awareness of privacy and security software
A survey conducted by Steganos, a provider of privacy software to more than two million consumers and SMEs worldwide, has found that many users are woefully unaware of the …
Sophos new WebAlert service explained with children’s toys
Sophos is offering customers a new alert service, called Sophos WebAlert, to warn administrators of malicious code being hosted on their websites. Sophos monitors your website …
BullGuard Internet Security 8.5 released
New BullGuard Internet Security 8.5 incorporates advanced Antivirus, Antispyware, Firewall, Spamfilter and Backup functionalities and provides home users with an …
New defense for DNS cache poisoning threat
NitroSecurity has developed a unique IPS solution that virtually eliminates the threat of DNS cache poisoning. Through research with the Rochester Institute of Technology …
IBM pushes for preemptive approach to Web application security
With more services moving online, the cost of recovering from a security breach can reach into the hundreds of millions of dollars. In addition, ensuring compliance with …
The power of distributed Wi-Fi encryption
Xirrus asserts the importance of line-rate Wi-Fi encryption at the network edge to support non-compromised Wi-Fi performance. The rollout of 802.11n – which brings a 6X …
Enterprise-grade password management solution
Cloakware announced the immediate availability of Cloakware Password Authority 4.0, the only enterprise-grade solution to automate the lifecycle management of privileged …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics