Please turn on your JavaScript for this page to function normally.
Spam stats for August: origins, categories and percentage

Worldwide Internet Mail Gateway Spam Percentage represents the number of messages that were processed and classified as spam versus the total number of messages processed when …

New Defiance Suite with enchanced mainframe data protection capabilities

Protegrity Corporation released Defiance Security Suite 4.5, the latest version of its award-winning data protection solution. The company broadens its mainframe data …

Partnership with Adobe for advanced electronic signature of documents

European electronic signature solutions provider Cryptolog has announced that it has signed a partnership agreement with Adobe to provide technology permitting the advanced …

Malware claims UK suffers nuclear explosion

Sophos has discovered a widespread spam campaign that claims that a powerful explosion occurred at a nuclear power station located in the suburbs of London on the afternoon of …

91% of organizations perceive cybercrime as a major business risk

Finjan announced the findings of its Web security survey of 1387 IT/Security professionals conducted during July 2008. The results reveal that an overwhelming number of …

Malware that creates fake YouTube pages for infecting users

PandaLabs has detected YTFakeCreator, a program used by cyber-crooks to create fake YouTube pages to infect users with malware. The infection method is as follows:  …

Mac OS X privacy software gets an update

Mireth released a new 4.2 version of NetShred X, their easy to use internet track eraser that erases internet tracks, such as cache, history and email. NetShred X runs on Mac …

Briefing on the upcoming Smart Cards in Government Conference

The 7th Annual Smart Cards in Government Conference (October 22 – 24, 2008)will look at the industry challenged with meeting a new administration’s timetable and …

New book: “Programing .NET 3.5”

Programming .NET 3.5 offers a grand tour of the release, describing how the four principal technologies can be used together, with Ajax, to build modern n-tier and …

Disaster recovery for Windows Server 2008 Hyper-V

The need for virtual server protection is increasing as IT organisations consolidate workloads using virtualisation software. Further magnifying this need is market research …

Forensic watermarking and DRM/CAS technologies

Medialive launched a new SDK product range: m2mark, which features a highly secure approach to merging forensic watermarking and DRM/CAS technologies. The solution integrates …

Protect consumer credit card information

Passlogix announced today that its v-GO Access Accelerator Suite provides a comprehensive technology solution for compliance with Payment Card Industry Data Security Standard …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools