Please turn on your JavaScript for this page to function normally.
New application security software from SPI Dynamics

S.P.I. Dynamics announced WebInspect, according to the company, the first and only web application security assessment tool to be re-architected to thoroughly analyze …

iPods and other portable storage devices still a growing threat for data leakage

CREDANT Technologies released a survey of 323 directors, managers, CIOs, CEOS and others from the fields of IT, banking and finance, medicine, government, and education on the …

Roaming wireless spammer escapes cell-time

Sophos is reminding computer users about the importance of securing their wireless internet access following the sentencing of a man who sent pornographic spam while driving …

World’s first mobile WLAN analyzer for 802.11n networks

AirMagnet recently announced AirMagnet Laptop Analyzer 7.5, the industry’s first mobile WLAN analyzer to natively decode and analyze 802.11n Wi-Fi networks. AirMagnet …

Company’s sending spam from their domain and don’t even know it

BorderWare Security Network reported that email traffic from individual organizations has over 80% of their email sent from IP addresses outside of their domain. The majority …

New Linux and FreeBSD Mail Security betas

ESET Mail Security protects e-mail messages and e-mail gateway servers against known and unknown viruses, worms, Trojans, spyware, phishing, spam and other Internet threats. …

First WordPress worm

A researcher discovered seven new WordPress vulnerabilities which may lead to a successful blog compromise under appropriate circumstances. All of them are detailed on his …

New book: “Cross-Site Scripting Attacks: XSS Exploits and Attacks”

WhiteHat Security today announced the availability of Jeremiah Grossman’s book — Cross-Site Scripting Attacks: XSS Exploits and Attacks. The book offers a detailed …

First NIST certification for encrypting hard drive

Seagate announced that the National Institute of Standards and Technology (NIST), the U.S. federal agency focused on promoting product innovation by establishing technical …

VoIP-to-Data exploit to be presented at Black Hat USA 2007

Sipera VIPER Lab will demonstrate a VoIP exploit that allows hackers to take control and delete or steal data from a laptop running an enterprise VoIP softphone, at the Black …

When trojans go phishing 500,000 get infected

Finjan released a report detailing how new Crimeware is being used to steal banking customer data from infected PCs. During July 2007, Finjan has identified 58 criminals using …

Trend Micro goes the Software-as-a-Service with SecureCloud

Trend Micro announced immediate availability of SecureCloud, their complete Software-as-a-Service Security platform offering its industry leading threat protection solutions …

Don't miss

Cybersecurity news