Google NativeClient Security contest
Do you think it is impossible to safely run untrusted x86 code on the web? Do you want a chance to impress a panel of some of the top security experts in the world? Then …
Video: Hiding Meterpreter with IExpress
This video by Rob Fuller demonstrates how to make running an executable less suspicious for the victim. Driving home the point that one should not run programs that you …
Increased VoIP quality and security with new MPLS offering
MegaPath announced its new Duet with MPLS and Managed Security service, providing high-quality voice combined with data security and performance. It allows customers to …
Central configuration and managing of application privileges
Avecto released Privilege Guard 2.0, which includes full integration with Active Directory Group Policy, enabling central configuration and managing of application privileges …
Innovative iris recognition system from AOptix
AOptix Technologies announced the release of InSight, their iris recognition system. The InSight, which operates at a nominal 2 meter stand-off distance, employs the …
Appliance to reduce WAN costs with secure Internet connections
Blue Coat Systems presented the ProxyAV 210, an appliance for optimizing WAN resources by enabling secure direct Internet connections to branch offices. It eliminates the cost …
VideoPlay adware infections grew 400% in February through malicious use of Web 2.0 pages
PandaLabs detected more than 400% more examples of the adware VideoPlay in February than in January. The main reason for this is the use of popular Web 2.0 sites such as …
Legitimate websites to feel Conficker worm’s impact
Sophos is warning computer users and website administrators to be vigilant this month as the Conficker worm is predicted to hit several legitimate sites, including Texan …
High-performance, exceptionally small computer from Marvell
Marvell announced its Plug Computing initiative to make high-performance, always on, always connected, and environmentally friendly computing readily available for developers …
Free software for cloud computing security
Third Brigade released Third Brigade VM Protection, a free software for cloud computing security for VMware infrastructure-based private cloud environments, vCloud service …
Gateway for balancing multiple Internet connections and scanning encrypted content
Gateway for balancing multiple Internet connections and scanning encrypted content Astaro released Astaro Gateway 7.4 (Astaro Security Gateway, Astaro Web Gateway and Astaro …
Top identity theft trends to watch out for
Consumers need to use all the tools available to proactively fight today’s creative, technologically-savvy identity thieves. Without the appropriate tools for protecting …
Featured news
Resources
Don't miss
- How neighbors could spy on smart homes
- How the City of Toronto embeds security across governance and operations
- Hottest cybersecurity open-source tools of the month: October 2025
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI
- Sanctions won’t stop cyberattacks, but they can still “bite”