Don’t sign your refund check over to malware writers
With tax season coming down to the wire, most American households are preparing to fire up their web browsers in order to use one of the main online tax preparation software …
Weekly report on viruses and intruders
Among the thousands of malicious codes that have appeared this week, the present PandaLabs report focuses on the Bankolimb.AF Trojan and the Autorun.RS worm. When it is run, …
VeriSign introduces security upgrades to its Project Titan
VeriSign announced an expansion of its Project Titan initiative to include additional security upgrades aimed at strengthening its global Internet infrastructure. When it …
Malware prevention for Skype
FaceTime Communications announced enhancements to its Greynet Enterprise Manager including detection of malicious URLs entering the enterprise network via Skype instant …
Howard A. Schmidt named (ISC)2 Security Strategist
(ISC)2 announced that information security industry veteran Prof. Howard A. Schmidt, CISSP, has been named (ISC)2 Security Strategist by the board of directors, a role that …
Red Hat Certificate System source code released
Red Hat has just released all of the source code to Red Hat Certificate System. Much of the technology in Red Hat Certificate System was already open source, including the …
Man admits to writing anime trojan horse
Masato Nakatsuji, the 24-year-old who in January became the first ever virus writer to be arrested in Japan, admitted in Kyoto District Court that he created a Trojan horse …
New Firewall Analyzer product suite
AlgoSec announced the availability of the AlgoSec Firewall Analyzer (AFA) product suite. The new suite, which improves the overall security and efficiency of enterprise …
New product: Sophos Endpoint Security and Control 8.0
Sophos announced Sophos Endpoint Security and Control 8.0, incorporating Network Access Control technology to go beyond reactive and proactive anti-virus – offering …
New version of BullGuard Backup
BullGuard released BullGuard Backup 8.0, the second version of its stand-alone backup offering. New features include improved encryption and compression options, a larger …
Identikey Server 3.0 – new authentication solution for large enterprises
VASCO Data Security International announced today that it launches its new authentication server, Identikey Server 3.0. This authentication solution, based on VACMAN’s …
Four key steps every company should take to protect its critical data
Ecora Software outlined a series of safeguards that companies should consider implementing in order to be protected from harm caused by unauthorized access to critical data. …
Featured news
Resources
Don't miss
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous