Please turn on your JavaScript for this page to function normally.
FreeBSD 8.0 Beta 1 is now available

The first public test build of the FreeBSD 8.0-RELEASE test cycle is now available, 8.0-BETA1. At this point the beta is not quite ready for production systems but mostly …

New book: “Regular Expressions Cookbook”

Every programmer can find uses for regular expressions, but their power doesn’t come worry-free. Even seasoned users often suffer from poor performance, false positives, …

WordPress 2.8.1 released

WordPress 2.8.1 fixes many bugs and tightens security for plugin administration pages. Core Security found that admin pages added by certain plugins could be viewed by …

Sober worm returns and uses social engineering techniques

PandaLabs has recorded the appearance of a new variant of the Sober worm, Sober.Y, which spreads using social engineering techniques in emails sent in English or German. The …

Security management application for the Mac

Bradford Networks has expanded its Campus Manager Security Management Application to include the Macintosh platform. The Security Management Application is an Endpoint …

Bunkermail: Secure, encrypted file transfer

GlobalCrypto released Bunkermail for highly-secure file transfer. A web-based email service, this no overhead encryption solution makes adoption easy for both IT and capital …

Spyware encounters are increasing at work

Trend Micro announced key findings from a study that reveals that more than 87 percent of corporate end users are aware of spyware, and yet 53 percent of survey respondents …

RSA Conference 2010 call for speakers

RSA Conference made available the offline call for speakers submission form for RSA Conference 2010, taking place March 1 – 5, 2010, at the Moscone Center in San …

58% of SMBs worldwide affected by malware

Panda Security has drawn up a worldwide barometer of security status in SMBs1. According to this study, 58% of SMBs worldwide are affected by malware. Brazil, at 86%, is the …

IBM develops shield to mask sensitive on-screen information

IBM Research has developed software that more efficiently and effectively hides sensitive or personal information that might otherwise appear on the computer screens of …

VPN management for Linux networks

NCP engineering released a new version of the software-based NCP Secure Enterprise Management (SEM) System for Linux-based systems. Developed from the ground up to make hybrid …

Guide to common hoaxes, hacks and Internet horrors

As Internet scams increase in sophistication, Network Box advises users to be more alert, with the publication of a guide to common hoaxes, hacks and Internet horrors. The …

Don't miss

Cybersecurity news