Please turn on your JavaScript for this page to function normally.
Video on targeted attacks

F-Secure’s Mikko Hypponen discusses the issue of Targeted Attacks.

Spyware Doctor gets a major overhaul

To make award-winning Spyware Doctor even more potent, PC Tools developers spent nearly two years rewriting their bullet-proof anti-malware technology to combat the next …

Securent joins with OASIS

Securent announced that it is a Sponsor Member of the Organization for the Advancement of Structured Information Standards (OASIS). OASIS is a not-for-profit, international …

Web application security tool extended for checking .NET applications

Fortify Software announced the extension of its Fortify Defender solution for applications written in the .NET language. Fortify Defender’s sophisticated technology …

nCipher payShield used by a leading bank in Croatia

nCipher announced that its payShield hardware security module (HSM) has been deployed at the core of a new telephone and internet banking system in Croatia. Privredna Banka …

2006 – a good year for Cyber-Ark

According to Cyber-Ark, 2006 marked a year of tremendous prosperity and growth in the emerging Privileged Password Management (PPM) market as regulatory compliance, along with …

First EAL4 evaluation to Swedish Common Criteria Scheme

atsec information security AB is performing an EAL4+ evaluation of Tutus Data AB F?¤rist VPN and Firewall for certification by the Swedish Certification Body for IT Security …

New solution in the secure file storage market

Dekart launched a new software product, Dekart File Move. This application is a real breakthrough in the secure files storage field. Private Disk File Move is designed to …

Malware of the week: Piggi.B worm, ReverseClick.A trojan and VideoCach adware

The Piggi.B worm, the ReverseClick.A Trojan, the VideoCach adware, and the potentially unwanted program (PUP) XPCSpy are the subject of this week’s PandaLabs report. The …

Vulnerability in the IPv6 protocol stack of OpenBSD

CoreLabs discovered that the OpenBSD kernel contains a memory corruption vulnerability in the code that handles IPv6 packets. Exploitation of this vulnerability can result in …

New Trojan variant steals confidential usernames and passwords

A Trojan variant named “Win32.LdPinch.kj’ can steal system usernames and passwords, get confidential data from applications and open a Backdoor in the compromised …

Acquisition supports commitment to market leadership in smart card technology

HID Global manufacturer in the access control industry and part of ASSA ABLOY’s Global Technologies Division, announced that it has acquired Integrated Engineering (IE), …

Don't miss

Cybersecurity news