Please turn on your JavaScript for this page to function normally.
Backdoor worm targets vulnerability in Microsoft Word

New variant of a Trojan Downloader is actively exploiting a recently found vulnerability in Microsoft Word 2000, informs Security Experts at MicroWorld Technologies. The …

Panda ActiveScan: top virused detected in August 2006

August has witnessed the same trend observed over the last few months with regard to computer threats. The current apparent calm in malware activity is simply due to a new …

How Personal & Internet Security Works

For majority of us working in information technology, knowledge on security and privacy topics is something that we need to possess. There are hundreds, or better say it …

New version of Pointsec Linux encryption software released

Pointsec announced the latest version of its endpoint encryption software for Linux desktops and laptops, Pointsec for Linux 2.0. Committed to its continued support of …

NETGEAR announces new SSL VPN Concentrator 25 appliance

NETGEAR announced the availability of the ProSafe SSL VPN Concentrator 25 (SSL312), an easy-to-use and reliable SSL VPN Solution that delivers clientless, secure remote access …

New ZyXEL Wi-Fi Finder device

The new ZyXEL AG-225H is being advertised as the ultimate high-tech tool for the road warriors. It combines a 802.11a/b/g USB 2.0 adapter with a fully functional wireless …

LaCie biometric hard drives for Macs

LaCie now offers a full range of secure desktop and mobile hard drives with biometric access control designed to protect confidential data from unauthorized use. The new LaCie …

Secure Computing launches new identity and access management appliance

Secure Computing Corporation announced the availability of its SafeWord SecureWire 50 identity and access management (IAM) appliance – the remote access, authentication …

SAP selects Breachview SSL

Breach Security, Inc. announced that SAP AG, the world’s leading provider of business software solutions, has chosen Breachview SSL to enhance its ability to detect …

The Changing Face of Disaster Recovery

Disaster recovery and remote office replication are increasingly becoming top-of-mind issues for IT professionals. It is ironic that tape, the most operationally unpredictable …

Secure Computing Closes Acquisition of CipherTrust

Secure Computing Corporation announced that it has closed its acquisition of CipherTrust. This merger firmly establishes Secure Computing as a dominant player in the …

Kaspersky Lab list of top viruses for August 2006

Position Change in position Name Percentage 1. 0 Net-Worm.Win32.Mytob.c 26.43 2. 0 Email-Worm.Win32.Nyxem.e 14.42 3. 0 Email-Worm.Win32.NetSky.b 8.06 4. 0 …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools