Please turn on your JavaScript for this page to function normally.
Critical vulnerability in AJAX technology – Web 2.0 applications at risk

Imperva Application Defense Center announced the discovery of a critical vulnerability in DWR (Direct Web Reporting), a key underlying technology in the AJAX web application …

Companies sign a licensing agreement for hardware-based security for virtual smart cards

Wave Systems announced that it has signed a licensing agreement with Deepnet Security to permit Deepnet to arm Deepnet’s Smart ID virtual smart cards with Wave’s …

Risk Mitigation for Legacy Windows NT 4.0 Systems

Arguably one of today’s biggest risks for network security and compliance are lingering systems that are no longer supported by their vendors. The security flaws in …

Latest Internet Confidence and Safety Survey results

Trend Micro’s Internet Confidence and Safety survey analyzes consumer perception regarding a number of Internet-related concerns such as how safe and confident consumers …

New Mobio handheld integrates Fujitsu MBF200 Fingerprint Touch Sensor IC

Fujitsu Microelectronics America announced that its MBF200 single-touch sensor IC has been integrated into Mobio, a handheld biometric security device developed by Cryptolex …

Worms and viruses that ruled in December

The last month of 2006 did not bring any substantial changes to the assortment of viruses found in the email traffic. Although analysis of the results for the entire year will …

New format of 3M confirm authentication products with Floating Image Technology

3M announced the launch of a new format of the 3M Confirm authentication products with floating image technology that helps to protect against counterfeiting and tampering. …

Information on the “Happy New Year” malware

Experts at SophosLabs have reminded computer users of the threat posed by unsolicited email following a large scale worm outbreak over the new year holiday period. The …

North American managed security market continues to grow

Spurred on by increasingly innovative security threats and a growing need to ensure legislative compliance, the North American managed security service providers market has …

New Proofpoint-powered email security service

Proofpoint and MessageOne announced the availability of comprehensive outsourced spam and virus protection through a managed service powered by Proofpoint technology. …

DieHard – a new software that prevents crashes and attacks

Today’s computers have more than 2,000 times as much memory as the machines of yesteryear, yet programmers are still writing code as if memory is in short supply. Not …

Malware scope: BukFeed.A trojan and Spamta.QH, Radoppan.I.drp and Nuwar.B worms

BukFeed.A is a low-threat Trojan with backdoor features that opens UDP port 1044 to enable remote access to the target computer. Also, it connects to a website to download …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools