New version of IBM Tivoli Identity Manager
The new version of IBM Tivoli Identity Manager has operational role management capabilities that help organizations manage user access as part of their business and risk …
Survey shows concern about mobile device security
The results of a survey by Harris Interactive found that nearly two thirds of mobile device owners are concerned about the security of their devices. The survey, which polled …
Five plead guilty in a multi-million e-mail stock fraud scheme
Five individuals pleaded guilty today in federal court in Detroit for their roles in a wide-ranging international stock fraud scheme involving spamming. Alan M. Ralsky, 64, …
Affiliate fraud cybersquatting model more lucrative than pay-per-click
While pay-per-click (PPC) sites remain a large part of the cybersquatting business model, there is another wave of massive-scale online infringement monetization called …
OESISOK Interoperability Certification Program expands to three levels
OPSWAT today announced three distinct levels of its OESISOK Interoperability Certification Program to verify that specific security applications operate with network devices. …
Elcomsoft is conducting a password usage behavior survey
Elcomsoft is a company well-known for their password recovery products. In the recent past they’ve been in the news for criticizing Adobe Acrobat 9 security as well as …
Facebook fixes privacy bug
Although Facebook is supposed to have clear privacy restrictions, it appears that a loophole has been identified. FBHive reported the following: “With a simple hack, …
12 requirements for next generation network access technology
NCP engineering has developed a blueprint for next generation network access technology. The roadmap details the 12 essential components organizations need to secure their …
New Seagate BlackArmor external storage solutions
Seagate announced the BlackArmor NAS 220 storage server, the BlackArmor WS 110 external drive workstation and the BlackArmor PS 110 portable drive. With features like …
OWASP Joomla vulnerability scanner
Joomla! is one of the most widely-used content management systems. Watching its vulnerabilities can be a daunting taks. JoomScan can help web developers identify possible …
Survey: 20% of IT security professionals cheat on audits
A survey of IT security managers and technical staff has revealed that 20% admit to cheating on an audit to get it passed. The survey by Tufin was conducted amongst 151 IT …
Gartner: Worldwide security software revenue up 18.6% in 2008
Worldwide security software market revenue totalled $13.5 billion in 2008, an increase of 18.6 per cent from 2007 revenue of $11.3 billion, according to Gartner. Analysts said …
Featured news
Resources
Don't miss
- Linux users targeted by crypto thieves via hijacked apps on Snap Store
- Pro-Russian hacktivist campaigns continue against UK organizations
- Cybercriminals speak the language young people trust
- Bandit: Open-source tool designed to find security issues in Python code
- The 2026 State of Pentesting: Why delivery and follow-through matter more than ever