Excel Password Recovery Master to the rescue
Excel Password Recovery Master ia dedicated tool to unlock Excel files and decrypt their content. The software gracefully removes all types of protection in Excel documents. …
New Peer-To-Peer trojan worm attacks enterprises
Security experts at MicroWorld Technologies inform that “Trojan.Win32.Inject.t’ or “W32/Inject-H’ is a new peer-to peer worm with IRC backdoor Trojan …
ITGI releases new guidance on Information Security Governance
While organizations can survive the loss of most assets, such as facilities and equipment, few can recover from ths loss of critical information, including financial or …
New Dell computers with TPM chips and bundled security software
Wave Systems security software is now shipping with new Dell Latitude notebooks and Dell Precision mobile workstations. Dell will include the Wave software as a standard …
Report on targeted attacks on corporate networks
Report on targeted attacks on corporate networks Panda Software has presented a white paper entitled “Protection for corporate networks against targeted attacks” …
PGP Comments on DTI Information Security Breaches Survey 2006
The DTI Information Security Breaches Survey 2006 (pdf) has found that only 25% of UK businesses use encryption to send messages to business partners, highlighting that many …
GFI EndPointSecurity has now gone live
London, UK, 28 March, 2006 – Today, GFI, an international leader and developer of network security, content security and messaging software, is announcing that GFI …
Secure Computing’s Zero-hour Attack Protection Technology Automatically Protects Against Recently Identified Sendmail Vulnerability
Bracknell, UK, March 27, 2006 – Secure Computing Corporation (NASDAQ: SCUR), the experts in securing connections between people, applications, and networks, today …
Appearance of multiple variants of the Bagle worm with rootkit
Over the last few days, PandaLabs has detected the appearance of the new variants HX, HY and HZ of the Bagle worm. The main innovation in these variants compared to their …
Weekly Report on Viruses and Intruders – Nabload.CC, Banker.CJA Trojans
This week’s report from Panda Software on viruses and intruders clearly reflects the recent new malware trends. Two of the examples of malicious code referred to in …
Protegrity Acquires Omnisecure, A Leader In File-Level Security
Stamford, CT, and Santa Clara, CA, March 23, 2006 — Protegrity Corporation, a leading provider of data security management solutions, today announced the acquisition of …
Panda Software releases a full report on targeted attacks on corporate networks
Panda Software has presented a white paper entitled “Protection for corporate networks against targeted attacks” to offer network administrators information about …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption