Cybersecurity programs expected to remain strong under next administration
U.S. federal government identity and smart card programs have grown significantly under the Bush administration. But with the election less than two weeks away, one …
8x more malicious email attachments spammed out in Q3 2008
IT security and control firm Sophos has released the results of its investigation into the latest spam trends and revealed the top twelve spam-relaying countries for the third …
New book: “Mac OS X for Unix Geeks”
In the fourth edition of “Mac OS X for Unix Geeks” the authors updated it for Mac OS X 10.5 and tweaked the book to make it even more interesting than before. By …
USB-based PKI device for strong authentication
VASCO Data Security International unveiled the Digipass Key1, a USB-based PKI solution for strong authentication, digital signature and data protection. Digipass Key1, is the …
Video – memory corruption and buffer overflows
This talk by David Aitel was recorded at the Open Web Application Security Project (OWASP) NYC Conference on Sep 25, 2008. Dave Aitel is CEO and founder of Immunity Inc., and …
Photo safeguards confidential information
These days you can take a photograph with almost every mobile phone. However, using this sort of photo to protect confidential data and send it safely is something new. Ileana …
Extreme Rugged system features Core 2 Duo and GME965 chipset
ADLINK Technology announced availability of the industry’s first Extreme Rugged system based on the Intel Core 2 Duo processor and GME965 chipset. The Ampro by ADLINK …
Lockheed Martin establishes Center for Cyber Security Innovation
Lockheed Martin announced the establishment of its new Center for Cyber Security Innovation (CCSI). The center of excellence represents an evolution for the company and its …
Video: OWASP application security industry outlook panel discussion
Recorded at the Open Web Application Security Project (OWASP) NYC Conference on Sep 24, 2008.
New release of Oracle Adaptive Access Manager
Oracle released OracleAdaptive Access Manager 10g Release 3. Key highlights include: Enhanced Auto Learning — highly advanced statistical evaluation techniques that …
Cyber-Ark updates its Inter-Business Vault
Cyber-Ark Software announced the availability of version 5.0 of the Inter-Business Vault (IBV), its widely-used Managed File Transfer solution that provides both business and …
Lansing spammer pleads guilty
A Lansing resident pleaded guilty in federal court in Detroit for her role in a wide-ranging international fraud scheme involving the illegal use of bulk commercial e-mailing. …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!