New trick adopted by spammers to harvest email addresses
IT security firm Sophos has warned computer users to think before forwarding chain letters after discovering a new scam being used by spammers to collect email addresses. A …
VIP Defense announces VIP Privacy
VIP Defense announces today the release of VIP Privacy, an ultimate program for user’s privacy protection. In the age of ever-growing alert for cyber-frauds, the …
Panda Software launches 2007 range of products
Panda Antivirus 2007 is the lightest antivirus in the Panda Software consumer solutions range. This new, easy-to-use, antivirus solution offers complete protection against …
Wave to support Trusted Computing Group’s Security Specifications for Mobile Phones
Wave Systems Corp. announced plans to extend its EMBASSY Trust Suite software in support of the newly published TCG security specifications for mobile phones. The announcement …
Arxceo awarded U.S. Patent for Anti-Reconnaissance and Anti-Address Spoofing technology
Arxceo Corporation has been awarded a crucial U.S. patent covering its core technology and approach to improving network security with its Plug and Protect (PnPRO) and …
Registration opens for updated CompTIA A+ Certification
The Computing Technology Industry Association (CompTIA), the world’s largest provider of vendor neutral certifications for professionals in the information technology …
Trusted Computing Group announces Open Specification for Mobile Phone Security
The Trusted Computing Group’s Mobile Phone Work Group, which has been working to create an industry-wide approach to securing data, transactions and content, for mobile …
Experts say laptops are the weak link in data security
New research has found that the frequency of laptop theft in the workplace is high. The findings mirrored those from last year, which indicated a similar lack of security …
Considered outsourcing the role of Chief Information Security Officer?
Organizations are barraged with overlapping regulatory compliance requirements and security vulnerabilities. For many small-to-midsize businesses a full-time Chief Information …
Compact Disc Eraser – Top American invention prevents eWaste
It is common for CD-R and DVDR users to accumulate stacks of old discs that are no longer needed or outdated. A personal CD destroyer is now available that helps prevent data …
KoolSpan awarded in a review of two-factor authentication solutions
KoolSpan announced it has received five-stars and an ‘SC Recommended’ designation in a comparative group review of two-factor authentication technologies in the …
Private Internet use by staff threatens IT security in Danish companies
IT analysis company IDC has recently published a new survey containing some alarming results: within the last year, almost 40% of companies questioned had experienced …
Featured news
Resources
Don't miss
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
- AI-driven insights transform security preparedness and recovery
- NDR’s role in a modern cybersecurity stack
- How Russian hackers went after NGOs’ WhatsApp accounts