Sophos top 10 malware threats and hoaxes in September 2006
Sophos, a world leader in IT security, has revealed the most prevalent malware threats and hoaxes causing problems for computer users around the world during September 2006. …
Study reveals major security flaws in most enterprises
Privileged passwords are the non-personal passwords that exist in virtually every device or software application in an enterprise, such as root on a UNIX server, Administrator …
Lexmark introduces smart card security solution for federal government
Lexmark International has introduced a unique authentication solution for laser multifunction products (MFPs) in response to the stringent security standards of the U.S. …
Weekly Report on Viruses and Intruders – Spamta worm, Microsoft VML vulnerability
This week’s report from Panda Software looks at the appearance of numerous variants of the Spamta worm, -in particular, the CY variant- as well as the Microsoft VML …
O’Reilly releases “Google Hacks, Third Edition”
By adding it to the dictionary, Webster finally made “google” an official verb. But Google today is so much more than googling the new boss or ex-boyfriend, and …
atsec information security Evaluates PR/SM LPAR for IBM System z9 Business Class and IBM System z9 Enterprise Class
atsec information security is pleased to announce completion of a Common Criteria evaluation of IBM Processor Resource/System Manager (PR/SM) LPAR for IBM System z9 Business …
Crafting holistic IT information security strategies
Enterprise Management Associates (EMA) announced the availability of a new report covering the landscape of IT solutions that address the increasingly vital concern for the …
Microsoft launches forefront security for SharePoint Beta
Microsoft launched the public beta of Forefront Security for SharePoint (http://www.microsoft.com/forefront). This latest release of Microsoft Forefront security products for …
Mac users warned of latest PowerPoint security problems
IT security firm Sophos is warning computer users to be extra cautious when opening unsolicited files as reports circulate of a newly discovered vulnerability in Microsoft …
O’Reilly releases “LPI Linux Certification in a Nutshell, Second Edition”
Certification of professionals is a time-honored tradition in many fields, including medicine and law. With the proliferation of small computer systems and networks, the …
Technology identifies evidence of terrorist activity in 100 billion call data records
EMC Corporation, Intec Telecom Systems and SenSage have pooled resources to provide a comprehensive, cost effective solution to answer the mandates of the EU Data Retention …
Phishing ring indicted in Connecticut court
Six men have been charged by a Connecticut grand jury with obtaining private financial information by means of using an online scam, ID theft and financial fraud. Of the six …
Featured news
Resources
Don't miss
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?