Please turn on your JavaScript for this page to function normally.
Majority of workers ignore the risks of web links and attachments in emails

A survey into the habits of 142 UK office workers conducted by Finjan, the global provider of best-of-breed proactive web security solutions, has uncovered that although they …

Latest email scam offers JFK assassination secrets for sale

IT security firm Sophos has warned computer users to be wary of an email claiming to come from a dying KGB agent, offering to pass on secrets of the John F Kennedy …

New identity theft and online fraud techniques

Authors of computer viruses and threats -including phishing scams- are looking for direct financial profit from cybercrime. For this reason, they are using more innovative and …

Two-factor authentication solution for OpenVMS systems

Process Software announced that it has achieved technical interoperability certification between the VMS Authentication Module and RSA SecurID two-factor authentication …

SECUDE secure notebook with additional functionality

SECUDE secure notebook 7.2 – the latest version of its popular security solution, with an extended range of features for greater all round security. SECUDE secure …

Suspected email scam ringleader arrested in Nigeria

Police in Amsterdam claim that the ringleader of an email scam that stole up to two million US dollars has been arrested in Nigeria’s economic capital, where more than …

CP Secure Content Security Gateway available with Websense Web Security Suite

Websense, Inc. and CP Secure, Inc., announced today that the CP Secure Content Security Gateway (CSG) appliance is now available integrated with Websense Web Security Suite …

NetManage to resell SSH Tectia products

SSH Communications Security Corp. and NetManage, Inc. announced a solution partnership agreement. Through this agreement, NetManage will resell SSH Tectia Client, Server, and …

AirDefense announces Mobile 4.0 product

AirDefense today announced the release of AirDefense Mobile 4.0, the newest version of the company’s security and wireless network assessment tool. Mobile 4.0 includes a …

Controversy around the index.dat Windows file

Oxygen3 is reporting about the controversy that is building around the INDEX.DAT file used by Microsoft Internet Explorer. This file works like a database with redundant …

Weekly Report on Viruses and Intruders – spying, hijacking computers and stealing bank details

This week’s report from Panda Software on viruses and intruders clearly reflects the new dynamic influencing malware creators. The three examples of malicious code …

Cyberoam Unified Threat Management appliances enchanced with identity-based firewall

Elitecore technologies, vendor of UTM appliances has introduced a unique user identity-based firewall that delivers consolidated, single-point security in the integrated …

Don't miss

Cybersecurity news