BlackBerry asset management, data protection and geolocation tracking
Absolute launched Computrace mobile for the BlackBerry platform, delivering asset management, data protection and geolocation tracking. After Computrace Mobile is installed …
NASA hacker denied UK trial
Are US authorities treating Gary McKinnon as a scapegoat, while other more serious cybercriminals escape and prove hard to catch? Earlier today, the British Crown Prosecution …
End-to-end protection and auditing for IBM mainframe databases
Imperva introduced SecureSphere Database Gateway for z/OS (DGZ), which monitors local and network activity by users and applications to prevent data loss, fraud, and automate …
Networking security appliances based on the Intel Q35 chipset
Acrosser Technology released the AR-R5700 Series of networking security appliances based upon the Intel Q35 chipset, capable of utilizing the Core2Quad, Core2Duo, and Celeron …
Flash Player update addresses security vulnerabilities
A potential vulnerability has been identified in Adobe Flash Player 10.0.12.36 and earlier that could allow an attacker who successfully exploits this potential vulnerability …
Data protection for mobile devices
Lumension announced it is extending data protection for Windows mobile devices with the introduction of Lumension Mobile, allowing organizations to centrally control and …
How to protect from man-in-the-middle attacks
In light of a new man-in-the-middle type of attack unveiled this week at Black Hat D.C., VeriSign provides simple tips for end users and businesses. The highlighted attack is …
D-Link unveils 802.11n dual-band wireless access point
D-Link is now shipping its latest 802.11n WLAN solution (DAP-2553). The high-speed AP includes integrated 802.3af PoE support, so the device can be mounted where power outlets …
Gmail users hit by phishing chat attack
Gmail users should be on their guard against phishing attacks following news that the email system has been the target of a campaign that spread via the Google Talk instant …
Excel vulnerability puts Macs to risk
Microsoft is investigating new public reports of a vulnerability in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel …
Sync your firewall configurations with Playbook
Matasano Chargen released Playbook 2.0, which makes it easier to manage your network’s firewall rules. It syncs your firewall configurations with a central web-based …
Juniper EX2500 ethernet switch for high-density 10GbE deployments
Juniper Networks announced the expansion of its Ethernet switching product portfolio with the EX2500 line of 10 Gigabit Ethernet (GbE) switch. The EX2500 line will be targeted …
Featured news
Resources
Don't miss
- The CISO view of fraud risk across the retail payment ecosystem
- Applying green energy tax policies to improve cybersecurity
- Microsoft reveals critical Windows Admin Center vulnerability (CVE-2026-26119)
- Data on 1.2 million French bank accounts accessed in registry breach
- Bug in widely used VoIP phones allows stealthy network footholds, call interception (CVE-2026-2329)