Please turn on your JavaScript for this page to function normally.
Mac OS X trojan horse changes your DNS settings

Macintosh security developer Intego reports that a malicious trojan horse has been found on several pornography web sites, claiming to install a video codec necessary to view …

Halloween used for infecting PCs

Sophos is warning that a cybercriminal gang is attempting to hijack the Halloween festivities to infect the PCs of innocent computer users. Malicious spam emails direct …

Secure your mobile phone with Phone Guardian v.2.0

Symbian Guru released the new version 2.0 of Phone Guardian – the security software which helps to protect the phone from theft and unauthorized access. Phone Guardian …

One-third of employees violate company IT policies

A national survey of U.S. white-collar workers commissioned by the nonprofit, independent organization ISACA (formerly the Information Systems Audit and Control Association) …

Advanced smart IC platform for secure government electronic IDs

Texas Instruments unveiled the RF360, the first smart integrated circuit (IC) platform to be developed specifically to meet the rigorous demands of the contactless government …

New advanced quality and security WLAN testing solution

Codenomicon introduced DEFENSICS for WLAN, an advanced quality and security testing solution that gives developers of wireless consumer devices, public broadband …

Secure storage bit-level splitting technology patent acquired

Internet Initiative Japan, one of Japan’s leading Internet access providers, announced the acquisition of exclusive license to SB Systems Inc.’s patented …

New integrated security solution for SMB

ESET Smart Security is a newintegrated security solution for consumers and small-to-medium-sized businesses. It includes antivirus, antispyware, antispam and firewall features …

Detailed report on campus security issues (3 year trend data)

CDW Government released the results of its third annual Higher Education IT Security Report Card, a national survey that asks higher education IT directors and managers to …

Top popular applications with critical security vulnerabilities

Bit9 released its annual list of the top popular applications with known vulnerabilities. Often running outside of IT’s knowledge or control, these popular applications …

Spam used to influence U.S. Presidential Election

A large wave of unsolicited e-mails exhorting the qualities of Ron Paul as a candidate for the U.S. presidency is being captured by BitDefender spam filters. The spam e-mails …

New product: HP StorageWorks Secure Key Manager

HP just introduced a centralized, hardened security appliance to help data center managers improve privacy compliance and reduce the risk of costly data-loss due to theft. The …

Don't miss

Cybersecurity news