New book: “iPhone UK: The Missing Manual”
iPhone UK: The Missing Manual, Second Edition (O’Reilly) is the first book about every Apple improvement to its own second edition–the iPhone 3G and iPhone 2.0. …
Check Point’s DynamicID simplifies two-factor authentication
Check Point announced a new authentication technology that leverages mobile devices to increase enterprises’ network security. While other solutions require multiple …
Secure Computing supplies SCADA-specific security signatures
Secure Computing is incorporating three new signature file types for SCADA-specific protocols into its Secure Firewall. SCADA (Supervisory Control and Data Acquisition) …
The insider security threat in IT and financial services
RSA announced the findings of its latest insider threat survey, conducted among attendees at industry events in North America and Latin America in 2008. The survey polled 417 …
Enterprise security solution for Linux on IBM System z
SSH Communications Security introduced SSH Tectia Server for Linux on IBM System z. This new version provides a unified, end-to-end security model that extends from …
First miniature security computer for Mac desktops and laptops
The new Gatekeeper Pico for Mac and Gatekeeper Card Pro for Mac, provide 12 internet security applications on a dedicated hardware that offloads security, improves …
Man indicted for alleged hack of Sarah Palin’s e-mail account
David C. Kernell, 20, was indicted by a federal grand jury in Knoxville, Tenn., for intentionally accessing without authorization the e-mail account of Alaska governor Sarah …
Consumers concerned about financial data protection
Solidcore surveyed more than 500 consumers nationwide about credit card use, and to gauge their privacy fears and buying habits when shopping at various retail stores. The …
Video surveillance dollars not just for security
Security is the best-known application of video surveillance, but by no means the only one. Transportation systems and retail are both promising markets for video …
Extensive list of new security vulnerabilities in enterprise VoIP systems
VoIPshield Laboratories made its third announcement of security vulnerabilities in Voice over IP systems marketed by Avaya, Cisco and Nortel. Vulnerabilities were also …
New Core Security IMPACT Pro 7.6
In the latest installment of CORE IMPACT Pro, Core Security added support for IPv6 infrastructure and extended the product’s powerful web application testing …
Vanguard Policy Manager enhances RACF security
Vanguard Integrity Professionals released Vanguard Policy Manager, software that enables organizations to reduce security risks and meet regulatory compliance requirements …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!