Twitter users hit by Chatwebcamfree attack
Twitter users should to be vigilant as approximately 750 accounts on the popular micro-blogging site have been hit by yet another hack attack. Experts at SophosLabs found that …
Dual segment 10 Gigabit intelligent bypass switch
Interface Masters Technologies unveiled the Niagara 2814 Intelligent Bypass which consists of dual 10Gb bypass segments which possess passive and active bypass switch …
Cost-effective single board computer from Axiomtek
Axiomtek has released its new cost-effective SBC81206 PICMG 1.0 PCI/ISA single board computer, based on the Mobile Intel 945GC Express chipset to support Intel Core 2 Duo …
New malware analysis technology improves threat detection
Sunbelt Software announced its new malware analysis technology, MX-Virtualization (“MX-V”), as part of a significant enhancement to its popular VIPRE Antivirus + …
Massive Twitter account hijacking spree
As posted by Rik Ferguson to Trend Micro’s CounterMeasure blog, it appears that there is a rash of Twitter account hijacking going on this evening. Hundreds of Twitter …
Secure data communication and protection for Windows Mobile
Certgate uveiled the Protector for Smart Phones, a hardware-based security solution for the protection of data and mobile communications. A smart card of the microSD type is …
iStockphoto struck by phishing attack
Popular stock photography website, iStockphoto, has been targeted by password thieves. According to a statement on the iStockphoto website, the phishing attack was perpetrated …
Web 2.0 defense system for enterprises
Optenet unveiled Optenet NetSecure, Optenet MailSecure, Optenet WebSecure and Optenet WebFilter – four new content security products that offer proactive protection from …
New Wireshark version addresses vulnerabilities
Wireshark is the world’s foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries and educational institutions. …
Cyber-criminals manipulate Internet searches to sell fake antivirus products
Cyber-criminals are manipulating search engine results to distribute malware, in particular, fake antivirus products. The reasons are simple: the criminals need to attract …
New version of the GNAT Pro Ada development environment
AdaCore announced GNAT Pro 6.2, the latest release of its GNAT Pro Ada development environment, available on 18 native and 28 cross platforms. It offers over 130 new features, …
Benchmarks for developing and growing an enterprise-wide software security program
Fortify Software released the “Building Security In Maturity Model (BSIMM),” the industry’s first-ever set of benchmarks for developing and growing an …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse