Full disk encryption activated by USB
LIGATT Security announced Locked Up, an encryption tool that acts like a vault for a computer, storing data securely. Using full disk encryption, Locked Up prevents all …
OpenSSH 5.3 released
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. It encrypts all traffic (including passwords) to …
AT&T acquires VeriSign’s global security consulting business
AT&T announced the acquisition of VeriSign’s global security consulting business in a transaction that closed today. Terms of the deal were not disclosed. The …
Wireless network sees through walls
According to Technology Review, it is now possible to see through walls using a wireless network. Neal Patwari and Joey Wilson, two researchers at the University of Utah …
Social media continue to attract criminals
F-Secure today released its Third Quarter 2009 Security Threat Summary. One of the notable trends during the quarter was a shift to leaner and more secure operating systems. …
Most networks unprepared for attack response
Solera Networks released the results of a survey on network forensics which found that an overwhelming number of companies have recently experienced or expect to experience a …
SharePoint and MySQL cloud backup solution
Zmanda announced version 2 of its Zmanda Cloud Backup (ZCB) product, with new features such as cloud backup of MySQL and SharePoint, geography control, selective restore and …
New York mayor fights identity theft
New Yorkers should be very pleased with their Mayor – at least regarding the steps he’s taking to prevent fraud and identity theft. According to the Yeshiva World …
GFI Software acquires Katharion
GFI Software has acquired hosted email filtering company Katharion and will be able to offer a hosted email filtering, anti-spam and anti-virus service later this quarter. …
IP retrieval solution for IP data compliance
CopperEye launched a new product that will allow communications operators to add IP data retention and retrieval capabilities to their existing systems. The IP Retrieval …
5 million new threats in three months
According to a new PandaLabs report the major story this quarter is that attackers have broken all records when it comes to creating new threats as over the last three months …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)