Please turn on your JavaScript for this page to function normally.
Global identity theft security solution

Using ID Alarm technology organizations worldwide can send security alerts to customers and the public when their personal ID is being used. This provides the earliest …

Gartner highlights five attributes of cloud computing

As cloud computing begins to move beyond the pure hype stage and into the beginning of mainstream adoption, Gartner has identified the five attributes of cloud computing. By …

Intel and Nokia partner for an open mobile computing platform

Further uniting the Internet with mobile phones and computers, Intel and Nokia announced a long-term relationship to develop a new class of Intel Architecture-based mobile …

New version of IBM Tivoli Identity Manager

The new version of IBM Tivoli Identity Manager has operational role management capabilities that help organizations manage user access as part of their business and risk …

Survey shows concern about mobile device security

The results of a survey by Harris Interactive found that nearly two thirds of mobile device owners are concerned about the security of their devices. The survey, which polled …

Five plead guilty in a multi-million e-mail stock fraud scheme

Five individuals pleaded guilty today in federal court in Detroit for their roles in a wide-ranging international stock fraud scheme involving spamming. Alan M. Ralsky, 64, …

Affiliate fraud cybersquatting model more lucrative than pay-per-click

While pay-per-click (PPC) sites remain a large part of the cybersquatting business model, there is another wave of massive-scale online infringement monetization called …

OESISOK Interoperability Certification Program expands to three levels

OPSWAT today announced three distinct levels of its OESISOK Interoperability Certification Program to verify that specific security applications operate with network devices. …

Elcomsoft is conducting a password usage behavior survey

Elcomsoft is a company well-known for their password recovery products. In the recent past they’ve been in the news for criticizing Adobe Acrobat 9 security as well as …

Facebook fixes privacy bug

Although Facebook is supposed to have clear privacy restrictions, it appears that a loophole has been identified. FBHive reported the following: “With a simple hack, …

12 requirements for next generation network access technology

NCP engineering has developed a blueprint for next generation network access technology. The roadmap details the 12 essential components organizations need to secure their …

New Seagate BlackArmor external storage solutions

Seagate announced the BlackArmor NAS 220 storage server, the BlackArmor WS 110 external drive workstation and the BlackArmor PS 110 portable drive. With features like …

Don't miss

Cybersecurity news