Please turn on your JavaScript for this page to function normally.
F-Secure Internet Security 2011 released

F-Secure Internet Security 2011 has been designed to be non-intrusive. This means the product only asks for the user’s attention when it’s really necessary. The …

Microsoft patches 11 vulnerabilities

Microsoft released nine security bulletins which include four critical and five important updates to address 11 vulnerabilities affecting Windows, Internet Information …

Growing dangers of digital music and movies

A growing number of cyber threats are associated with the popularity of online music and videos, according to a McAfee report. Researchers found that adding the word …

Debunking the email privacy myth

Email communications are inherently risky, and information transmitted by email, including sensitive data and business-critical transactions, is more vulnerable than most …

Remote monitoring software for BlackBerry

SpectorSoft released eBlaster Mobile, remote monitoring and surveillance software. eBlaster Mobile allows you to remotely monitor the activity of anyone using a BlackBerry …

Samba 3.5.5 security release

Samba is the standard Windows interoperability suite of programs for Linux and Unix. Samba 3.5.5 is a security release in order to address CVE-2010-3069. All Samba versions …

Variable speed encryption appliances

CipherOptics a new line of Variable Speed Encryption (VSE) appliances. While traditional encryption appliances are based on a static throughput, the new VSE line of network …

Global botnet offering DDoS services

Damballa discovered a botnet that offers pay-for-delivery DDoS attacks. The IMDDOS botnet, named after the commercial name on the botnet website, has grown to be one of the …

ESET Cybersecurity for Mac

ESET Cybersecurity for Mac is a new security solution that delivers protection against internet security threats without impacting system performance. Users get both Internet …

Cloud computing trust-based security

Trusted Computing Group, which develops industry standards for hardware-based security rooted in trust, announced an effort to extend the concept of trust to cloud-based …

“Here you have” virus authors may be based in Spain

The “Here you have” virus, which first appeared about a month ago, is a worm that has spread widely via email using social engineering (the name of the virus stems …

New data security software from IBM

Today, organizations are struggling to manage a variety of complex data security threats, from misuse by insiders or cyber criminals outside the company. Combined with an …

Don't miss

Cybersecurity news