Please turn on your JavaScript for this page to function normally.
Use military-grade procedures to remove all traces of any file

IT administrators can now surgically remove all traces of selected data on any drive in their network. Jetico released BCWipe Enterprise featuring Enforcer technology for …

FinallySecure releases Secure SignOn 7.0

FinallySecure uveiled version 7.0 of Secure SignOn, which comes with enhanced support for Web, Windows, Java and Terminal applications as well as a brand new learning wizard …

July will be “Month of Twitter Bugs”

Security expert Aviv Raff declared July 2009 as “Month of Twitter Bugs”. He’s doing so in order to raise awareness of the Twitter API issue he recently …

Web and IM Security Gateway for virtualized environments

FaceTime Communications announced that its Unified Security Gateway version 2.2 (USG 2.2) now supports VMWare to enable virtual server deployment. FaceTime’s USG is a …

Apple releases Java update

Java for Mac OS X 10.5 Update 4 delivers improved reliability, security, and compatibility for Java SE 6, J2SE 5.0 and J2SE 1.4.2 on Mac OS X v10.5. This release updates Java …

Cyber security model to address 21st century challenges

A collaborative white paper, Building A Cyber Supply Chain Assurance Reference Model, released today by Science Applications International Corporation (SAIC) and the Supply …

D-Link network camera for remote monitoring of security video

The new D-Link Network Camera (DCS-1100) is ‘mydlink-enabled’, allowing it to be easily viewed and managed by the mydlink portal. A wireless 802.11n version, the …

New fraud-fighting product from Kount

Kount has created an ala-carte menu of the technologies and bundled them into a new product called Kount XTV. Among the technologies included in XTV are Kount’s new …

Enterprises underestimate risks from terminated employees

Courion releases survey results revealing that while a vast majority (93%) of organizations are confident that terminated employees pose no security risk to their systems by …

New steganographic tool: Virtual Steganographic Laboratory

Virtual Steganographic Laboratory (VSL) is a simple, easy to use software for steganography, steganalysis and watermarking. It gives scientists and students a tool for …

Security Blanket: Linux lock-down tool

Trusted Computer Solutions is offering a free trial version of its Security Blanket product for Linux. Security Blanket is a system lock-down and security management tool that …

Codezero Microkernel 0.1 has been released

Codezero is a new L4 microkernel that has been written from scratch. It is a modern microkernel implementation that provides capabilities for virtualization and implementation …

Don't miss

Cybersecurity news