Free e-book: “Scared Safe: Life’s Little Identity Theft Prevention Handbook”
E-Book entitled “SCARED SAFE: Life’s Little Identity Theft Prevention Handbook” by Todd Feinman, is available for free download beginning today for anyone …
New solution for protecting wireless devices from data loss
Based on the successful Computrace desktop and laptop management solution from Absolute, new Computrace Mobile is the only solution on the market for the management of all …
Storm and the future of social engineering
In 2007, Storm burst onto the scene and spread rapidly. A new form of malware that propagated using a combination of email and websites, it proved extraordinarily …
Critical vulnerability in Citect’s SCADA software
Core Security Technologies issued an advisory disclosing a vulnerability that could severely impact organizations relying on Citect’s flagship industrial process control …
Plug-and-play NAC appliance from Mirage Networks
Mirage Networks introduced a new appliance, the MAX-500, that brings complete NAC coverage in the form of a plug-and-play appliance. The new platform offers all components of …
Drive Backup: File-level backup and easy system restore
Paragon released Drive Backup 9.0 which provides home PC and home office users with a new approach to file-level backup along with a powerful system restore functionality. Two …
Flexible card-shaped authenticator from RSA
RSA announced the RSA SecurID 1100 Display Card, an event-based, one-time password (OTP) authenticator in a flexible card form-factor designed to help financial institutions …
Findings of the 2008 Data Breach Investigations Report
Nearly nine in 10 corporate data breaches could have been prevented had reasonable security measures been in place, according to a comprehensive report issued today by Verizon …
PCI compliance is not achievable without source code analysis
Application security expert Jack Danahy, co-founder and CTO for Ounce Labs, today asserted that source code analysis is the only means possible to conclusively claim …
Billing records theft at University of Utah Hospitals & Clinics
The University of Utah Hospitals & Clinics informed its patients about the recent theft of billing records and to provide them with resources to protect their …
Small Business Information Security Act of 2008 introduced
Yesterday, leading Members of both the House and Senate Small Business Committees introduced the Small Business Information Security Act of 2008, S. 3102 and H.R. 6206. This …
Video – Cyber attack in Estonia
In spring 2007, Estonia’s banks and newspapers were shut down by an organized wide-scale cyber-attack using botnets.
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics