Please turn on your JavaScript for this page to function normally.
Hacker-friendly wireless router from Netgear

The new Netgear Open Source Wireless-G Router (WGR614L) is a full-featured wireless router designed to serve as a reliable, high-performance platform to support a wide variety …

New high performance UTM appliances

Check Point expanded its UTM-1 Total Security appliance line. The appliances provide a security solution that combines firewall, virtual private network (VPN), intrusion …

Workshop highlights adoption of identity-based encryption

Voltage Security today summarized the results from the recent National Institute of Standards and Technology (NIST) sponsored workshop: Applications of Pairing Based …

Top of the Zombie charts: Verizon, Telecom Italia and Brasil Telecom

Commtouch released its second quarter 2008 Email Threats Trend Report, based on the automated analysis of billions of email messages weekly. The report examines recent trends …

Statistics show that spammers are not giving up

While antispam filters have become more sophisticated in the last year, and spam threats have emerged and dissipated, it is clear that spammers are not giving up the spam …

Hacked personal email accounts used for personalized 419 scam

At first glance, the email below looks like a typical 419 scam: The twist is that the email came from a user’s hacked webmail account and was sent to his personal list …

Encryption key management for Oracle Database 11g

nCipher announced its nShield and netHSM key management solutions are now integrated with Transparent Data Encryption, part of Oracle Database 11g Advanced Security option. …

New malware dominated by Trojans

Panda Security announced the findings from its second quarterly report of 2008 which revealed that Trojans comprised over 63 percent of all new malicious codes. Adware …

Cybercriminals reinvent methods of malicious attacks

Cybercriminals are not only leveraging new technologies to propagate cybercrime, but are also reinventing forms of social engineering to cleverly ensnare both consumers and …

Mounting privacy laws have companies struggling to keep compliant

When it comes to shredding sensitive business documents, leaders of some of America’s largest companies are devoting more attention and more money to keeping information …

Data leaks are a top concern

Trend Micro reported that data leaks are becoming a leading source of headaches for U.S., U.K., German and Japanese companies, according to the results of a study that …

Digital DNA secures online identities

Torotech has introduced what it claims is the first digital DNA mapping technology to protect the identities and security of users accessing bank accounts or shopping online. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools