New version of iServices Trojan now in pirated Adobe Photoshop CS4
Intego has discovered a new variant of the iServices Trojan horse that the company discovered on January 22, 2009. This new Trojan horse, OSX.Trojan.iServices.B, like the …
Fraud costs rise, challenging online businesses
Fraud is taking a bigger bite out of UK online revenues according to the figures come from a survey of 150 online merchants undertaken by CyberSource. One in eight businesses …
Fujitsu develops HDD security technology based on Opal SSC standards
Fujitsu announced the development of new security technology to make its 2.5-inch encrypted hard disk drives support the Opal Security Subsystem Class (Opal SSC). Opal SSC is …
2008 spam lessons learned: “Stop the guns, not just the bullets”
Marshal8e6, a provider of web and email security products, released its TRACE report for the second half of 2008 which finds that while global spam volumes continued to …
NetMRI 3.0 introduces impact analysis to Network Configuration and Change Management
NetMRI 3.0 solves the number-one challenge that undermines network performance and policy compliance – internal changes to the network, whether malicious or inadvertent …
Mac theft recovery application Undercover now with location tracking
Orbicule announced the integration of Wi-Fi Positioning software from Skyhook Wireless into Undercover, a theft-recovery application that can track any stolen Mac. Undercover …
Positive financial results from Check Point Software
Positive financial results are not so common these days, so let us briefly cover that Check Point Software reported record fourth quarter and fiscal year 2008 numbers. Here …
VoIP service providers not focusing on impending threats
As the VoIP market evolves, security threats loom on the horizon. However, service providers are not seemingly taking the necessary actions to prepare for the impending …
Backup and disaster recovery for virtual environments with Arkeia Network Backup 8
Arkeia Software released Arkeia Network Backup 8 which delivers the first true virtual appliance for backup that gives customers free choice of hardware. The Arkeia Virtual …
Most SharePoint users are inadequately protected
A survey conducted by Osterman Research and commissioned by Trend Micro of 269 IT managers involved in overseeing the messaging and collaboration infrastructure of their …
Commex HTX-based content-aware 10GbE network adaptor – Vulcan SE HT6210
Commex Technologies announced its Vulcan SE HT6210 content-aware dual-channel 10GbE Network Interface Card (NIC) for the HP ProLiant DL785 G5 server which connects the network …
78% of computer users never encrypt emails
A privacy and encryption survey conducted by Steganos has found that consumers are not using encryption to protect their online identity. Steganos surveyed 120 consumers in …
Featured news
Resources
Don't miss
- Attackers hit MSP, use its RMM software to deliver ransomware to clients
- Why data provenance must anchor every CISO’s AI governance strategy
- Woodpecker: Open-source red teaming for AI, Kubernetes, APIs
- Hottest cybersecurity open-source tools of the month: May 2025
- Microsoft, Dutch security agencies lift veil on Laundry Bear cyber espionage group