The Wireshark certification program
CACE Technologies along with Wireshark University, announced the rollout of The Wireshark Certification Program. This new program strives to test a candidate’s knowledge …
DoS vulnerability in popular VoIP product
Mu Dynamics discovered and helped remediate a new programming flaw in ReSIProcate: A remotely exploitable Denial of Service vulnerability. The ReSIProcate components, …
Face recognition middleware for embedded systems
Oki Electric Industry announced its launch of a face recognition middleware for the surveillance market. The “FSE (Face Sensing Engine) Ver.4” for embedded systems …
Comprehensive data flow and VoIP management
Packet Island released an enterprise-lite version of PacketSmart, the proven carrier-class VoIP-Data lifecycle management solution. The PacketSmart Enterprise-Lite Platform …
MultiFactor SecureAuth for Microsoft Office SharePoint Server 2007
MultiFactor Corporation today announced the availability of SecureAuth 4.5 for Microsoft Office SharePoint Server 2007, a secure access solution for enterprise portals. Office …
Mobile surveillance on the iPhone
Lextech Labs introduced iRa, a remote surveillance viewing and control system that puts the power of multiple live video feeds and direct camera pan-tilt-zoom control in the …
Pass the sunscreen and your sensitive data
As the number of vacationers taking their laptops and devices poolside increases, so do the risks to corporate data. These devices often contain confidential corporate …
New automated protection switch boosts router-based network reliability
Cornet Technology announced the availability of its latest intelligent protection switch, the RPS-24, that is targeted at backing up routers in dark or dim sites where …
Juniper Networks operations to be hosted in the new IBM “green” data center
IBM and Juniper Networks announced they have signed a five-year, data center hosting agreement with IBM to support Juniper’s global operations. As part of the …
Diamond Cipher hard drive kit
Addonics Technologies announced a hard drive kit with built-in eSATA and USB 2.0 connectors that allows users to easily connect an external SATA hard drive to a system or use …
Secure Hitachi terabyte hard drive
The Deskstar 7K1000.B provides an exceptional blend of power efficiency and performance, making it an ideal solution for power-friendly consumer and commercial PCs. The new …
Malware scenario: Third World War has begun
Sophos is warning of an attempt by hackers to infect computers using the camouflage of a news report claiming that the USA has invaded Iran. Widely spammed out emails with …
Featured news
Resources
Don't miss
- How military leadership prepares veterans for cybersecurity success
- Fighting fraud with AI: The new identity security playbook
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)