CA releases Security Compliance Manager
CA Security Compliance Manager is a new product that delivers capabilities that help CA customers address IT security and compliance with legal, corporate and government …
Bank of New York Mellon security breach repeats in PA
Following a February 27 security breach in Connecticut by the Bank of New York Mellon in which it lost up to 4.5 million customers’ unencrypted financial data from banks …
Watch out for a sneaky blackmailing virus that encrypts your data
Kaspersky Lab found a new variant of Gpcode, a dangerous encryptor virus has appeared, – Virus.Win32.Gpcode.ak. Gpcode.ak encrypts files with various extensions …
June 2008 cyber threat forecast
MX Logic today published a new monthly report that aims to help inform organizations about potential email and Web threats in advance so they can take preventative action. In …
Free utility for improving security of VMware ESX Hypervisor deployments
Tripwire ConfigCheck is a free utility that quickly assesses configuration settings for the VMware ESX hypervisor and recommends steps to take to ensure even greater security. …
Vulnerability found in the latest Symbian operating system
It is now possible for mobile phone hackers to bypass the security system of the Symbian OS 9 based S60 3rd Edition phones with a mobile application. Symbian OS 9 based S60 …
Network security market softer than usual in North America
Infonetics Research says in a new report that the worldwide network security appliance and software market is down 4% to $1.3 billion from 4Q07 to 1Q08, primarily due to …
New SecureZIP brings public key cryptography to everday users
According to its developers, new SecureZIP for Windows Desktop version 12.1 revolutionizes public key cryptography by making it available to and easily used by businesses and …
Most dangerous domains to surf and search on the web
Hong Kong (.hk) domain has jumped 28 places as the most dangerous place to surf and search on the web according to a new McAfee report called “Mapping the Mal Web …
Full guide on Mac OS X 10.5 Leopard security configuration
This guide provides an overview of features in Mac OS X that you can use to enhance security and harden your computer. In the paper, you can read instructions and …
New Payment Card Industry compliance solution
Tufin Technologies today announced a new PCI Compliance solution as part of its SecureTrack security operations management product. It provides a comprehensive PCI-DSS Audit …
Top ten ID theft safety tips from the experts
By the time you finish reading these tips, another 100 American identities will be stolen. ID theft tops the list of consumer complaints at the Federal Trade Commission (FTC). …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics