InfoSec World 2008: Photos of the venue
Here’s a collection of photos of the Orlando venue where the InfoSec World Conference & Expo 2008 is taking place.
Open source code for driving security into web services
OpenLiberty, the global open source community working to provide developers with resources and support for building interoperable, secure and privacy-respecting identity …
Breach Security upgrades web application security solution
WebDefend, now in version 3.2, identifies and stops abuse of web application resources, offers higher performance, and delivers enhancements to ease enterprise-wide adoption. …
SSH Communications Security releases SSH Tectia 6.0
SSH Communications Security Corp. released SSH Tectia Client 6.0, SSH Tectia Server 6.0, SSH Tectia Manager 6.0, and the new, innovative SSH Tectia ConnectSecure 6.0. …
NSA certifies the Sectera Edge smartphone
The National Security Agency (NSA) has certified the wireless Sectera Edge smartphone, a product of General Dynamics C4 Systems, for voice communications classified up to the …
Brothers sentenced for selling $6+ million in pirated software
Two brothers were sentenced today in federal court to 30 months and three years in prison for selling massive amounts of pirated computer software. After receiving complaints …
Top 10 malware of the week
According to data gathered at the Infected or Not website the NaviPromo adware has been the most active malicious code this week. Adware occupies nine spots in the top ten …
WatchGuard unifies security and mobility
WatchGuard unveiled new remote access solutions designed to give remote and mobile workers highly secure connectivity to their corporate network. For enterprise organizations …
Enhanced protection for Exchange and SQL servers in a virtual environment
Companies are increasingly using virtualization for a variety of different productivity and cost saving reasons. Virtualization is being increasingly used by IT departments …
Details on the new anti card fraud mobile phone technology
A new Israeli technology brought to the U.S. by Secure Identity Systems (SIS) thwarts credit and debit card fraud, and potentially stops ID thieves in the act. This in turn …
Annual state of IBM System i (AS/400) security study
The PowerTech Group, Inc. today released its fifth annual review of the state of security on IBM’s System i platform (also known as AS/400 or iSeries). This year’s …
Free wireless network security scan
Pure Networks Security Scan provides an online free wireless network security scan that lets anyone quickly check for security issues on their individual computers and their …
Featured news
Resources
Don't miss
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous