Help Net Security
Red Hat expands server virtualization interoperability
Red Hat has signed reciprocal agreements with Microsoft to enable increased interoperability for the companies’ virtualization platforms. Each company will join the …
IEEE announces development of IMT-advanced candidate
In a statement to the Radiocommunication Sector of the International Telecommunication Union (ITU-R), IEEE has announced its intention to submit a candidate radio interface …
Keeping Virtual Security Real
Remember the first time you drove a car on your own, and you’d get a kick from the sensation of sheer speed? Unfortunately, you also have to learn the mundane stuff like …
Research reveals impact of security issues on mobile device manufacturers
McAfee announced findings from new research that reveals that mobile device manufacturers are not only experiencing more mobile security issues than ever before but are also …
UPEK launches biometric fingerprint solutions for netbooks
UPEK announced fingerprint authentication solutions for manufacturers of netbooks and Mobile Internet Devices (MIDs) to integrate into these new classes of portable, …
Debian GNU/Linux 5.0 released
Debian GNU/Linux version 5.0 (codenamed “Lenny”) has been unveiled after 22 months of constant development. Debian is a free OS which supports a total of twelve …
Fujitsu solution for bandwidth burdened networks
Fujitsu announced today its new
The top 20 Valentine’s Day spam subjects
Symantec’s Dylan Morss posted a blog post where he wrote down a list of the top 20 Valentine’s Day spam subject lines for February. Here is the list: St. …
Distributed end-to-end encryption of sensitive data with SecureData
Voltage Security enhanced SecureData, supporting more environments and platforms than ever before, including end-to-end encryption across distributed environments such as …
Companies should stop whitelisting their own email domain names
Nearly 20 per cent of all spam now forges the domain name of the recipient – ie looks as though it comes from the recipient, or someone in their company – …
D-Life security camera system for home surveillance
D-Link announced its easy-to-install, easy-to-use D-Life Web-based home surveillance camera systems are now available channel-wide and have enhanced optics, lower prices and …
New interoperability specification for encryption key management
Brocade, HP, IBM, LSI, RSA, Seagate and Thales announced the creation of a jointly developed specification for enterprise key management that is engineered to dramatically …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems