AT&T acquires VeriSign’s global security consulting business
AT&T announced the acquisition of VeriSign’s global security consulting business in a transaction that closed today. Terms of the deal were not disclosed. The …
Wireless network sees through walls
According to Technology Review, it is now possible to see through walls using a wireless network. Neal Patwari and Joey Wilson, two researchers at the University of Utah …
Social media continue to attract criminals
F-Secure today released its Third Quarter 2009 Security Threat Summary. One of the notable trends during the quarter was a shift to leaner and more secure operating systems. …
Most networks unprepared for attack response
Solera Networks released the results of a survey on network forensics which found that an overwhelming number of companies have recently experienced or expect to experience a …
SharePoint and MySQL cloud backup solution
Zmanda announced version 2 of its Zmanda Cloud Backup (ZCB) product, with new features such as cloud backup of MySQL and SharePoint, geography control, selective restore and …
New York mayor fights identity theft
New Yorkers should be very pleased with their Mayor – at least regarding the steps he’s taking to prevent fraud and identity theft. According to the Yeshiva World …
GFI Software acquires Katharion
GFI Software has acquired hosted email filtering company Katharion and will be able to offer a hosted email filtering, anti-spam and anti-virus service later this quarter. …
IP retrieval solution for IP data compliance
CopperEye launched a new product that will allow communications operators to add IP data retention and retrieval capabilities to their existing systems. The IP Retrieval …
5 million new threats in three months
According to a new PandaLabs report the major story this quarter is that attackers have broken all records when it comes to creating new threats as over the last three months …
Network packet generator Hyenae 0.35-1 released
Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable …
Will Germany’s secret service be allowed to conduct online computer searches?
According to Deutsche Welle, a German newspaper unearthed a secret document belonging to the Interior Ministry, in which is suggested that the secret service should be allowed …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform