New services to secure Web applications from TippingPoint
TippingPoint announced its Web Application Digital Vaccine (Web App DV) services, a two-part approach to address the security threat posed by Web applications. This new set of …
ICSA Labs on Twitter Worm
Andy Hayter, Anti-Malcode Program Manager at ICSA Labs, has put together some brief facts about the Twitter worm. The Twitter worm that began to spread on Easter Sunday is a …
Kaspersky Lab analyzes new version of Conficker
Kaspersky Lab, a leading developer of secure content management solutions, announces that a new version of the malicious program Conficker (aka Kido and Downadup) has been …
McAfee offers guidance to improve critical infrastructure security
Recent reports that the US electrical grid has been penetrated by spies from China and Russia has prompted security experts from McAfee to issue a warning and advice to …
Seagate hard drives for digital video surveillance systems
Seagate introduced its Seagate SV35.5 Series hard drives, designed for optimal performance in digital video surveillance systems. The Seagate SV35.5 hard drive is built for …
IT executives view technology innovation as a necessity in challenging economy
Recent research from Unisys shows that IT executives view driving technology innovation as an imperative for them to help their businesses flourish in a global marketplace …
Nessus 4 has been released
Tenable released version 4 of the Nessus vulnerability scanner. Nessus is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset …
USB 2.0 mini fingerprint scanner from Futronic
Futronic released the FS90 USB 2.0 mini fingerprint scanner which uses a specially designed optic system to deliver high quality image in a very small form factor. It’s …
Open source NAC system PacketFence 1.8.2 is out
PacketFence is a free and open source network access control (NAC) system. PacketFence is actively maintained and has been deployed in numerous large-scale institutions over …
Common access card authentication solution from Ricoh
Ricoh announced the availability of its Common Access Card (CAC) Authentication Solution for the U.S. Department of Defense (DoD). As part of Homeland Security Presidential …
New variant of Conficker
Trend Micro discovered a new file sourced by a known Conficker P2P IP node – a new variant of Conficker now known as WORM_DOWNAD.E, indicating that creators behind the …
Security policies should include Twitter?
Business should review their security policies to include Twitter, according to a guide released today by Network Box. The guide includes this advice for companies: User …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring