Please turn on your JavaScript for this page to function normally.
Crimeware double threat menaces Internet

The APWG announced today that its January survey shows a new record high in the number of unique keylogger crimeware variants detected – while the number …

New Motion Computing F5 Tablet PC with a fingerprint sensor

AuthenTec’s fingerprint sensor has been integrated as a standard feature into the new Motion Computing F5 tablet PC. The F5 tablet, which combines the best features of a …

Hosting provider The Planet offers a May firewall discount

The Planet, the world’s largest privately held dedicated hosting company, today announced a new promotion for the month of May with savings of up to 26 percent per month …

More April malware trends

Analysis of Web security activity shows 36.1 percent of all web-based malware intercepted was new in April, as increase of 23.3 percent since March. In April 2008, the global …

Texas has a very high rate of identity theft

Identity Theft 911 released a new report today that finds this problem is reaching epidemic levels in many areas of Texas, which ranks 2nd in the nation for identity theft …

More info on the IdentiPHI flagship product

IdentiPHI recently announced the availability of its new flagship security software, IdentiPHI SAFsolution 5 Enterprise Edition. Today we got some more information on the …

BeyondTrust announces Vista UAC security

BeyondTrust Corporation released Privilege Manager 4.0, the first product to use Group Policy to manage Vista Integrity Levels. It enables customers to set the integrity level …

Compliance Coach identifies 23 identity theft red flags

The Federal regulation imposes new responsibilities on businesses to prevent consumer identity theft. The impact is broad and the rule affects every single bank, credit union, …

NetMotion launches Mobility XE 8.0

NetMotion Wireless released version 8.0 of Mobility XE, the mobile VPN software. This latest version provides new security controls that intelligently extend corporate …

Enterprises move to the next level in security needs

Enterprises in Asia have long gone beyond appreciating the role of security in integrating technology with their businesses. Today, they have matured to the next crucial stage …

Three steps for PCI DSS Compliance on Wi-Fi devices

A new white paper from Summit Data Communications reveals three best practices for ensuring that Wi-Fi client devices are compliant with the Payment Card Industry Data …

Book giveaway – win a copy of “Zero Day Threat”

Update (May 12th 2008) – The winner is Travis N. We are giving one of our readers a copy of the recently released book “Zero Day Threat: The Shocking Truth of How …

Don't miss

Cybersecurity news