Video: The DEFCON Experience
This is a documentary about the experience of first-time DEFCON attendees from the University of Delaware. They traveled from Newark, DE to Las Vegas for DEFCON 16, gave a …
Anti-piracy solution maps route to unlicensed software
V.i. Laboratories upgraded its software anti-piracy platform with new features that help Independent Software Vendors (ISVs) quickly determine who is using their unlicensed …
Amazon now offers physical data transfer
Amazon Web Services (AWS) Import/Export is a new offering that accelerates moving large amounts of data into and out of AWS using portable storage devices for transport. AWS …
State of Web 2.0 use, policies and security worldwide
Websense revealed the findings from a global survey of 1,300 information technology managers across ten countries, asking about their perceptions of Web 2.0 in the workplace, …
BitDefender unveils free editions of several tools
BitDefender announced that many of its most popular security solutions as free editions, available for download. BitDefender Free Edition is an on-demand virus scanner and …
Anti-Malware Testing Standards Organization to analyze anti-malware reviews
The Anti-Malware Testing Standards Organization (AMTSO) has intends to provide public analysis of anti-malware reviews. This analysis will be done by comparing the testing …
Adobe Reader and Acrobat security initiative
Brad Arkin, the Director of Product Security and Privacy at Adobe has outlined their efforts in making sure Adobe comes out with more secure products in the future: 1. Code …
Web film series on cybercrime: “H*Commerce: The Business of Hacking You”
McAfee launched a new Web film series, entitled “H*Commerce: The Business of Hacking You.” The film series was created to expose cybercrime as a serious and …
CA automates essential mainframe security operation
CA announced CA Compliance Manager for z/OS, a platform-resident solution to provide real-time automated policy management of security and compliance events across the IBM …
Enterprise class log management and forensics from Tenable
Tenable Network Security released of Security Center 3.4.4 and Log Correlation Engine 3.2 for general availability. With this release, Tenable now offers enterprise customers …
Consensus metrics for information security
The Center for Internet Security (CIS) announced the public release of the industry’s first consensus metrics for information security. The metrics are user-originated, …
F-Secure launches Mac protection technology preview program
If you’re interested in getting down and dirty with some malware on your Mac, testing F-Secure Mac Protection might be the way to spend some free time. If you’re …
Featured news
Resources
Don't miss
- Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)
- How a noisy ransomware intrusion exposed a long-term espionage foothold
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory
- Cryptomixer crypto laundering service taken down by law enforcement