June 2008 cyber threat forecast
MX Logic today published a new monthly report that aims to help inform organizations about potential email and Web threats in advance so they can take preventative action. In …
Free utility for improving security of VMware ESX Hypervisor deployments
Tripwire ConfigCheck is a free utility that quickly assesses configuration settings for the VMware ESX hypervisor and recommends steps to take to ensure even greater security. …
Vulnerability found in the latest Symbian operating system
It is now possible for mobile phone hackers to bypass the security system of the Symbian OS 9 based S60 3rd Edition phones with a mobile application. Symbian OS 9 based S60 …
Network security market softer than usual in North America
Infonetics Research says in a new report that the worldwide network security appliance and software market is down 4% to $1.3 billion from 4Q07 to 1Q08, primarily due to …
New SecureZIP brings public key cryptography to everday users
According to its developers, new SecureZIP for Windows Desktop version 12.1 revolutionizes public key cryptography by making it available to and easily used by businesses and …
Most dangerous domains to surf and search on the web
Hong Kong (.hk) domain has jumped 28 places as the most dangerous place to surf and search on the web according to a new McAfee report called “Mapping the Mal Web …
Full guide on Mac OS X 10.5 Leopard security configuration
This guide provides an overview of features in Mac OS X that you can use to enhance security and harden your computer. In the paper, you can read instructions and …
New Payment Card Industry compliance solution
Tufin Technologies today announced a new PCI Compliance solution as part of its SecureTrack security operations management product. It provides a comprehensive PCI-DSS Audit …
Top ten ID theft safety tips from the experts
By the time you finish reading these tips, another 100 American identities will be stolen. ID theft tops the list of consumer complaints at the Federal Trade Commission (FTC). …
Securely upload, store and manage files via a bank’s online portal
Research has demonstrated that customers’ overall satisfaction rating with a bank is dependent on their impression of the usefulness of the bank’s website. As a …
Secure remote access for Apple iPhone from Check Point
Check Point announced Check Point VPN-1 support for the Apple iPhone, allowing secure remote access to corporate network systems. Check Point VPN-1 enables an encrypted …
New biometric fingerprint sensor for 2009 Notebook PCs
UPEK today launched the TCS5 TouchStrip Fingerprint Sensor, a technology breakthrough designed to be integrated into 2009 notebook PC models worldwide. Building on the …
Featured news
Resources
Don't miss
- Product showcase: Secure digital and physical access with the Swissbit iShield Key 2
- Trojanized KeePass opens doors for ransomware attackers
- Closing security gaps in multi-cloud and SaaS environments
- Containers are just processes: The illusion of namespace security
- Why legal must lead on AI governance before it’s too late