McAfee to acquire Secure Computing
McAfee, Inc. announced the execution of a definitive merger agreement to acquire Secure Computing Corporation for $5.75 per common share in cash, without interest, …
Malicious obfuscated code evolution
Finjan announced that its Malicious Code Research Center (MCRC) discovered examples of obfuscated code embedded in rich-content files, and not only in HTML-webpages on …
Patent on PKI certificate technology
SSH Communications Security, a world-leading provider of enterprise security solutions and end-to-end communications security, and the original developer of the Secure Shell …
Network troubleshooting and remediation with PacketTrap Perspective
PacketTrap Networks announced the availability of PacketTrap Perspective, a new network troubleshooting and remediation solution developed for the single and multiple-site …
Music piracy group member goes to prison
Barry E. Gitarts, 25, of Brooklyn, New York, was sentenced today to 18 months in federal prison after his conviction on May 22, 2008, for conspiracy to commit criminal …
New Intel vPro technology enhances security
Intel Corporation today introduced its third-generation Intel vPro suite of business desktop PC technologies, which among other features enhances security and reduces the time …
Handhelds with integrated biometrics
Law enforcement, military, and Homeland Security personnel looking for fully-integrated mobile identity verification options now have two new tools to better track and locate …
Software escrow strategy for automating intellectual property protection
iForem unveiled its strategy for developing and delivering on-demand, purely-digital Automated Intellectual Property Protection products. iForem’s current and planned …
Business use of Wi-Fi hotspots increases by 46%
iPass released the latest edition of the iPass Mobile Broadband Index, which tracks the wireless use patterns of mobile workers around the world. The report shows worldwide …
US responsible for the majority of cyber attacks
SecureWorks published the locations of the computers, from which the greatest number of cyber attacks were attempted against its clients in 2008. The United States topped the …
Real-time intelligence visualization
Recent decades have seen the widespread adoption of short-range wireless communications, including wireless LANs (Wi-Fi), ultra-wideband (UWB), and RFID. All of these can be …
85% of malware is now distributed through the Web
Webroot released primary research revealing the impact of Web 2.0 on the enterprise. An overwhelming 85 percent of malware is now distributed through the Web, but businesses …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics