Please turn on your JavaScript for this page to function normally.
First automated tool to lockdown Linux servers to meet DISA STIGS

Trusted Computer Solutions announced that Security Blanket 1.2, an automated tool for locking down Linux operating systems, now supports the government’s lock down …

WLAN security applications for OQO Ultra Mobile PC

AirMagnet Laptop Analyzer and AirMagnet Survey are the first WLAN security and management applications to offer platform support for Ultra Mobile Personal Computers (UMPCs). …

Attachmate ships updated set of Secure Shell clients and servers

Attachmate Corporation today announced the availability of Attachmate Reflection for Secure IT 7.0, a set of Secure Shell (SSH) clients and servers for Windows and UNIX that …

Use of worms to steal confidential data increasing in 2008

This year has begun with alarming data: in addition to Trojans, the use of worms to steal users’ confidential data is also on the increase. According to data collected …

Europe crowned new king of spam

According to the Symantec State of Spam Report, the percentage of spam messages that claimed to originate from Europe is now significantly greater than the percentage of spam …

Attend Black Hat DC Briefings 2008 for FREE!

We have four complimentary access passes to the upcoming Black Hat DC Briefings. The Briefings will be held February 20-21 in Westin Washington DC City Center. The admission …

Anti-Malware Testing Standards Organization formed

More than 40 security software technologists and anti-malware testers from around the world recently met in Bilbao, Spain to formalize the charter of the Anti-Malware Testing …

WoW password stealing worm and YouTube video playing trojan

The list of the most active malware this weekis headed by two variants of the Bagle worm. The Comet adware, which shows ads to users through banners, pop-ups, etc, comes in …

Research debunks common myths associated with IT risks

Symantec IT Risk Management Report Volume II reveals that awareness of the importance of IT risk management is increasing, however several myths persist. Despite the finding …

State of email authentication and the Internet trust ecosystem

Authentication & Online Trust Alliance (AOTA) announced the “2008 State of Email Authentication and the Internet Trust Ecosystem” report.  The group found …

Distributed Ethereal sniffer as a managed service

Packet Island, Inc. today announced their latest SaaS-based sniffer product, PacketPro. This product has the ability to provide managed service providers and IT outsourcing …

New Cisco book: “Router Security Strategies: Securing IP Network Traffic Planes”

Router Security Strategies: Securing IP Network Traffic Planes provides a comprehensive approach to understand and implement IP traffic plane separation and protection on IP …

Don't miss

Cybersecurity news