Please turn on your JavaScript for this page to function normally.
VoIPshield uncovers more VoIP security vulnerabilities

VoIPshield made its second announcement of security vulnerabilities in Voice over IP systems marketed by Avaya, Cisco and Nortel. This brings the total number of vulnerability …

Secure USB token for passwords and network identities

SCM Microsystems announced CHIPDRIVE MyKey, a new, highly secure USB device that makes it safer and easier for people to access the Internet and information networks. Based on …

First tri-band WLAN module in SDIO card form factor

Silex Technology unveiled the SX-SDWAG, a wireless module that provides 802.11a/b/g capabilities in an SDIO card form factor. Designed for wireless local area network (WLAN) …

6 tips for preventing laptop theft or loss

Absolute Software, the leading provider of patented computer theft recovery offers some advice on how to avoid becoming the next data loss headline: 1. Visual deterrents …

Details on a major vulnerability affecting Yahoo! Mail

Cenzic today published an advisory regarding a vulnerability discovered in Yahoo! Mail. This Cross-Site Scripting vulnerability allows attackers to steal Yahoo! identities and …

Is China leaving the Internet’s back door open?

The majority of the Internet’s malware-infected websites are located on Chinese networks, finds a new report released today by StopBadware.org, the university-based …

MultiFactor SecureAuth for Cisco VPN access enables PCI compliance

MultiFactor announced the availability of SecureAuth 4.5 for Cisco VPN Authentication, a secure access solution addressing specific PCI compliance requirements for large …

APSolute Immunity provides networks with ability to fight emerging threats

Radware introduced its APSolute Immunity security initiative, a new strategic approach that maintains business continuity by protecting the applications infrastructure against …

More malicious attacks on the Threat Horizon

The Information Security Forum (ISF) is warning of an increase in malicious threats including attacks from organised crime and industrial espionage, along with a rise in …

Malware growth at a higher level than ever before

In its 2008 first half data security summary, F-Secure reports malware growth rate at a higher level than ever before. This recent explosion of malware doesn’t …

New book: “Your Brain: The Missing Manual”

Your Brain: The Missing Manual is a practical look at how to get the most out of your brain — not just how the brain works, but how you can use it more effectively. What …

Multiple vulnerabilities in Ruby

Multiple vulnerabilities in Ruby may lead to a denial of service (DoS) condition or allow execution of arbitrary code. With the following vulnerabilities, an attacker can lead …

Don't miss

Cybersecurity news