RFID solution for IT asset tracking
Companies are challenged with accounting for millions of dollars of owned and leased IT assets within their expansive data centers. Of even greater concern is the potential …
Windows Live Hotmail CAPTCHA cracked by spambots
Websense Security Labs ThreatSeeker technology has discovered that spammers in their recent tactics have drawn their attention towards traditional and infamous Hotmail, aka …
Unique exploitation scenario using a recently disclosed Flash vulnerability
Memory corruption vulnerabilities are becoming increasingly difficult to exploit, largely due to the protection mechanisms being integrated into most modern operating systems. …
PCI Security Standards Council issues Payment Application Data Security Standard
The PCI Security Standards Council, a global, open industry standards body providing management of the Payment Card Industry Data Security Standard (DSS), PCI PIN Entry Device …
Data at rest security for Oracle customers goes global
Relational Database Consultants announced today that the Encryption Wizard, a leading security and encryption software offering for the Oracle RDBMS, now ships with Natural …
New version of Zertificon secure virtual mailroom
Z1 SecureMail family of products safeguards a company’s e-mail transmissions across the board with its encryption and signature – and, in the process, remains …
Post-April tips to prevent identity theft
Tens of millions of tax returns have just been filed electronically for the tax year 2007. Anyone who has filed their taxes this way and has their personally identifiable …
Check Point delivers new Power-1 appliances
Check Point today announced the launch of Check Point Power-1, a new line of Internet security appliances offering high-performance sites a simple, robust, and easy to manage …
New book: “Crimeware: Understanding New Attacks and Defenses”
The security threat landscape has dramatically changed in the past few years. In this single volume, “Crimeware: Understanding New Attacks and Defenses” an …
New book: “iPhone Open Application Development”
Certain technologies bring out everyone’s hidden geek, as the iPhone did instantly upon its release. Now programmers are yearning to showcase their applications on it, …
Top four malware security tips
Webroot has issued a white paper entitled ‘How to Protect Business from Malware at the Endpoint and the Perimeter’ that includes four key tips to protect …
ZombiCop for Internet Service Providers
PineApp has launched its new ZombiCop solution for ISPs to block the growing volumes of spam from zombie computers that is increasingly resilient to existing anti-virus or …
Featured news
Resources
Don't miss
- CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
- Malicious RVTools installer found on official site, researcher warns
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management