New identity theft and online fraud techniques
Authors of computer viruses and threats -including phishing scams- are looking for direct financial profit from cybercrime. For this reason, they are using more innovative and …
Two-factor authentication solution for OpenVMS systems
Process Software announced that it has achieved technical interoperability certification between the VMS Authentication Module and RSA SecurID two-factor authentication …
SECUDE secure notebook with additional functionality
SECUDE secure notebook 7.2 – the latest version of its popular security solution, with an extended range of features for greater all round security. SECUDE secure …
Suspected email scam ringleader arrested in Nigeria
Police in Amsterdam claim that the ringleader of an email scam that stole up to two million US dollars has been arrested in Nigeria’s economic capital, where more than …
CP Secure Content Security Gateway available with Websense Web Security Suite
Websense, Inc. and CP Secure, Inc., announced today that the CP Secure Content Security Gateway (CSG) appliance is now available integrated with Websense Web Security Suite …
NetManage to resell SSH Tectia products
SSH Communications Security Corp. and NetManage, Inc. announced a solution partnership agreement. Through this agreement, NetManage will resell SSH Tectia Client, Server, and …
AirDefense announces Mobile 4.0 product
AirDefense today announced the release of AirDefense Mobile 4.0, the newest version of the company’s security and wireless network assessment tool. Mobile 4.0 includes a …
Controversy around the index.dat Windows file
Oxygen3 is reporting about the controversy that is building around the INDEX.DAT file used by Microsoft Internet Explorer. This file works like a database with redundant …
Weekly Report on Viruses and Intruders – spying, hijacking computers and stealing bank details
This week’s report from Panda Software on viruses and intruders clearly reflects the new dynamic influencing malware creators. The three examples of malicious code …
Cyberoam Unified Threat Management appliances enchanced with identity-based firewall
Elitecore technologies, vendor of UTM appliances has introduced a unique user identity-based firewall that delivers consolidated, single-point security in the integrated …
“Practical Guide to Computer Forensics” released
J. Frank Grindstaff, Jr. CPA, and David Benton, CFCE, the authors of “Practical Guide to Computer Forensic”, have crafted a timely book for accountants, auditors, …
SecureMac announces MacScan 2.2 spyware protection
SecureMac announced the release of MacScan 2.2, a minor update to its popular anti-spyware program. Starting with MacScan 2.1, MacScan has been totally revamped and is now a …
Featured news
Resources
Don't miss
- Sensitive data of Eurail, Interrail travelers compromised in data breach
- PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
- Microsoft shuts down RedVDS cybercrime subscription service tied to millions in fraud losses
- LinkedIn wants to make verification a portable trust signal
- QR codes are getting colorful, fancy, and dangerous