Please turn on your JavaScript for this page to function normally.
10 tips to keep IT security costs down in the recession

1. Move to UTMs (unified threat management systems) UTMS save money over multiple point solutions. They can cost just a quarter of the price of multiple solutions. With UTMs …

Twitter scareware attack signals new social networking security problems

The arrival of what appears to be the first scareware distribution attack on the Twitter microblogging service at the weekend, signals the fact that firms need to think very …

Free detection of viruses and spyware wherever you go

How many times have you found yourself providing computer support for your family and friends? This summer, F-Secure Online Scanner will make that task easier. The Online …

The first DRM solution approved by an anti-DRM gamers group

ByteShield received the results from the PRISM/RYG testing of ByteShield. PRISM, a gamers group for sensible DRM solutions, has thoroughly tested ByteShield and found it to be …

OpenSolaris 2009.06 released

Sun unveiled OpenSolaris 2009.06, delivering features in networking, storage and virtualization, along with performance enhancements and developer productivity updates. …

Compact forensic data capturing solution from Logicube

Logicube’s Forensic Quest is meant for in-the-field or in-the-lab hard drive forensic data acquisition and verification. Users can now capture and authenticate hard …

Fingerprint sensor with integrated LEDs

UPEK unveiled its TouchLight technology which integrates light emitting diodes (LEDs) for user prompting and feedback directly into the company’s broadly adopted …

High-accuracy mass intercept location solution

Polaris Wireless announced the first high-accuracy mass intercept location application. The mass intercept solution is capable of pinpointing the precise location of all …

Low bit levels could compromise encryption

Newswire reports suggest that the take-up of encryption amongst organizations is improving, but there is a big question mark over the encryption used being powerful enough to …

Three year old worm accounts for almost a quarter of email-borne malware

Sophos has revealed the most prevalent malware threats and countries causing problems for computer users around the world during November 2007. The study, compiled by …

New version of employee monitoring tool

3ami released Monitoring & Audit System (MAS) v7, which enables businesses to monitor and audit employee usage of USB devices on company computers. MAS captures and …

New book: “Learning SQL, Second Edition”

Although SQL is an old language, it’s going to be around for a lot longer, and has a bright future in store, says author Alan Beaulieu. “Properly designed, a …

Don't miss

Cybersecurity news