Please turn on your JavaScript for this page to function normally.
Active response to database threats

AppSecInc announced DbProtect Active Response. Designed to provide an added layer of security around valuable and sensitive data, it gives organizations the flexibility to …

Data security for businesses that don’t need a full security suite

Protecting sensitive data is an irreplaceable part of computer security. Useful tools for data encryption and shredding belong to the standard gear of TrustPort Total …

F-Secure launches Internet Security 2012

F-Secure launched Internet Security 2012, an improved version of its online safety offering. It is easy to use and the new Launch pad provides convenient access to all parts …

MagicTree: Data management for penetration testers

Have you ever spent ages trying to find the results of a particular portscan you were sure you did? Or grepping through a bunch of files looking for data for a particular host …

Cloud-based anti-phishing software platform

FraudSense announced a public demo featuring its proprietary real-time anti-phishing detection algorithms. FraudSense identifies and disables fraudulent websites in real-time. …

GFI VIPRE Antivirus Business 5.0 released

GFI Software launched GFI VIPRE Antivirus Business 5.0 and GFI VIPRE Business Premium 5.0, the latest evolutions of the company’s flagship antivirus solutions. GFI has …

Check Point stops bot attacks

Check Point announced a new Anti-Bot Software Blade that protects against bots and APTs (Advance Persistent Threats). Check Point helps customers discover bots and prevent …

Stonesoft a2Cloud: Strong authentication for secure cloud access

Stonesoft announced its new a2Cloud solution which offers secure access to the cloud with usability, minimal administration and low total cost of ownership. a2Cloud delivers …

Data security for Microsoft SharePoint

Imperva announced SecureSphere for SharePoint, a data security solution to help businesses protect sensitive data stored in Microsoft SharePoint. The product addresses the …

Patching strategies

Cybercriminals have initiated an arms race by refining the malware manufacturing and development process to systematically bypass defense mechanisms. There are many …

Anti-theft protection for Android and Windows devices

Norton Anti-Theft is a new Web-service that allows consumers to remotely lock, locate and recover a lost or stolen Windows based laptop, or Android smartphone or tablet. The …

Critical vulnerabilities in Adobe Photoshop Elements 8

Critical vulnerabilities exist in Adobe Photoshop Elements 8.0 and earlier versions. These two buffer overflow vulnerabilities (CVE-2011-2443) could cause a crash and …

Don't miss

Cybersecurity news