Please turn on your JavaScript for this page to function normally.
IBM leads the pack in the intrusion detection market

IBM announced that it has been recognized as the world leader in the intrusion detection and intrusion prevention market in 2007 in a new research service by global growth …

Check out the “Hiring Guide To The Information Security Profession”

(ISC)² published “Hiring Guide to the Information Security Profession”, a free reference guide for human resource (HR) professionals, hiring managers and …

Smallest form-factor data security card

Hifn announced immediate availability of the Express DS 255, the industry’s highest-performance, lowest-power and smallest form-factor data security card.  Delivering …

First device Certificate Authority for next-gen crypto

Certicom launched its new Certicom Device Certificate Authority, a managed service offering that issues digital certificates to high-volume device manufacturers that have bulk …

Net/FSE: free network forensic search engine

Network security tools company Packet Analytics launched Net/FSE, the Network Forensic Search Engine. Net/FSE is the first commercial search engine for enterprise network data …

Where is malware hosted?

The results of Sophos research into which countries contain the most malware-hosting websites reveal some significant changes over last year’s top ten list. China has …

IBM Lotus Quickr file encryption solution

New Voltage SecureFile for IBM Lotus Quickr brings information encryption to documents within the Lotus collaboration environment.Voltage SecureFile for IBM Lotus Quickr …

Listing of recent cybercrime related arrests

The repercussions for cybercriminals are finally coming in line with the severity of their crimes. With international computer crime authorities joining efforts in a bid to …

Storm worm chronology

The Storm worm, also known as Dref or Dorf, was 2007’s most disruptive threat, with around 50,000 variants seen over the course of 2007. The criminals behind the Storm …

2008 threat report: Mobile security threats

More info from the Sophos Threat Report for 2008. There are approximately 200 malware threats for mobile phones, compared to over 300,000 for Windows. The risk of being …

Mac security under real threat?

In its latest security threat report, Sophos reveals that in 2007 organised criminal gangs for the first time arrived at Apple’s doorstep with the intention of stealing …

RFID replay attack allows free travel in The Netherlands

A week ago a TV program was broadcasted about the successful attack on the single-use RFID-based Dutch public transit card by computer science student Roel Verdult of the …

Don't miss

Cybersecurity news