Please turn on your JavaScript for this page to function normally.
85% of US organizations hit by one or more data breaches within the last 12 months

PGP Corporation announced the results from The Ponemon Institute’s fourth annual study on encryption usage in the enterprise – The 2009 Annual Study: U.S. …

Trend Micro’s protection for virtual machines

Trend Micro is expanding its virtualization security portfolio with a content security solution to protect VMware ESX/ESXi environments. Core Protection for Virtual Machines …

Firewall management app turns firewalls back into network security devices

Pressures to keep network traffic flowing through firewalls combined with fear and anxiety over causing interruptions to business processes has created a situation where …

Criminals use enterprise strategies to conduct attacks

Cisco released their 2009 Midyear Security Report, which shows that Internet criminals are increasingly operating like successful businesses, borrowing some of the best …

Microsoft releases 6 security updates

Another Patch Tuesday and Microsoft comes out with security updates for ActiveX, DirectX, ISA Server 2006, Office Publisher, Virtual PC, Virtual Server and Windows. Two of the …

Cyberduck 3.2.1 released

Cyberduck, the FTP, SFTP, WebDAV, cloud files and Amazon S3 browser for Mac OS X, has reached version 3.2.1. The changes in the release include: Create placeholder objects for …

Video: June 2009 threat webscape

June was a huge month for malicious email campaigns. There was a big rise in the volume of malicious messages sent, and many companies were hit by spear phishing campaigns. …

SmartWorkflow: New security management software blade

Check Point announced SmartWorkflow, a new security management software blade that provides customers the option of extending their security infrastructure with policy change …

New book: “Web 2.0 Architectures”

Web 2.0 is more pervasive than ever, but business analysts and technologists are still struggling to comprehend what it can offer them. So what exactly is it–a marketing …

New Trojan variants evade major anti-virus engines

Millions of e-mail viruses bypassed major anti-virus engines during the second half of the second quarter, according to the Q2 2009 Internet Threats Trend Report by Commtouch. …

Spam now represents 90 percent of inbound email

Marshal8e6 released its bi-annual TRACElabs report detailing the latest spam and exploit levels. From January to June 2009, they observed a staggering 60 percent increase in …

Vulnerability in Microsoft Office Web Components

Microsoft is investigating a vulnerability in Microsoft Office Web Components. An attacker who successfully exploited this vulnerability could gain the same user rights as the …

Don't miss

Cybersecurity news