Check Point simplifies security for private clouds
Check Point introduced Check Point Virtual Systems, that allow customers to secure multiple network segments by selecting any combination of Check Point software blade …
Norman updates Malware Analyzer G2 platform
Norman announced the new version of its Malware Analyzer G2 platform which delivers to analysts the latest automated analysis tools. Malware Analyzer G2 Version 3 delivers: …
Scareware targets users infected with industrial espionage worm
ACAD/Medre.A, a worm that steals AutoCAD drawings and sends them to remote servers, was recently discovered infecting a great number of computers in Peru and some other Latin …
ASUS eStore allegedly hacked
Another day, another data breach, another password dump. Softpedia reports that NullCrew, a hacker group that claimed responsibility for the recent PBS and World Health …
Yahoo! closes security hole that led to huge password breach
Yahoo! has patched the security hole that allowed hackers to access some 450,000 email addresses and passwords associated with Yahoo! Contributor Network and ultimately …
How to make smart grids
A smart grid is an upgraded electricity network with two-way digital communication between supplier and consumer. The adoption of smart grids will change the distribution and …
The growing headache of protecting mobile devices
33 per cent of UK organizations foresee the protection of mobile devices in the workplace to be the biggest security headache they will encounter in the year ahead, according …
KeePass Password Safe 1.23 released
KeePass Password Safe is a free, open source, light-weight and easy-to-use password manager for Windows, Linux, Mac OS X and mobile devices. You can store your passwords in a …
Panda Security launches Panda Cloud Systems Management
Panda Security released Panda Cloud Systems Management, a remote management and monitoring solution designed to manage, monitor and maintain IT resources. The solution allows …
Secure cloud-based email service
Perimeter E-Security introduced a new offering that enables email users to easily access and search their entire mailbox archive on virtually any device, whether they are in …
Hacking Exposed 7: Network Security Secrets and Solutions
Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today’s most devastating attacks and proven countermeasures. The 7th …
Week in review: Yahoo password leak, multi-platform backdoor, Microsoft revokes its code-signing certificates
Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: Worldwide IT spending to surpass $3.6 trillion in 2012 In …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)