Please turn on your JavaScript for this page to function normally.
Olympic torch hoax burns a hole in productivity, again

The Olympic Torch Virus Hoax is back in circulation in a big way. This time it’s seen doing rounds predominantly among Orkut Online Community members, informs Security …

New trick adopted by spammers to harvest email addresses

IT security firm Sophos has warned computer users to think before forwarding chain letters after discovering a new scam being used by spammers to collect email addresses. A …

VIP Defense announces VIP Privacy

VIP Defense announces today the release of VIP Privacy, an ultimate program for user’s privacy protection. In the age of ever-growing alert for cyber-frauds, the …

Panda Software launches 2007 range of products

Panda Antivirus 2007 is the lightest antivirus in the Panda Software consumer solutions range. This new, easy-to-use, antivirus solution offers complete protection against …

Wave to support Trusted Computing Group’s Security Specifications for Mobile Phones

Wave Systems Corp. announced plans to extend its EMBASSY Trust Suite software in support of the newly published TCG security specifications for mobile phones. The announcement …

Arxceo awarded U.S. Patent for Anti-Reconnaissance and Anti-Address Spoofing technology

Arxceo Corporation has been awarded a crucial U.S. patent covering its core technology and approach to improving network security with its Plug and Protect (PnPRO) and …

Registration opens for updated CompTIA A+ Certification

The Computing Technology Industry Association (CompTIA), the world’s largest provider of vendor neutral certifications for professionals in the information technology …

Trusted Computing Group announces Open Specification for Mobile Phone Security

The Trusted Computing Group’s Mobile Phone Work Group, which has been working to create an industry-wide approach to securing data, transactions and content, for mobile …

Experts say laptops are the weak link in data security

New research has found that the frequency of laptop theft in the workplace is high. The findings mirrored those from last year, which indicated a similar lack of security …

Considered outsourcing the role of Chief Information Security Officer?

Organizations are barraged with overlapping regulatory compliance requirements and security vulnerabilities. For many small-to-midsize businesses a full-time Chief Information …

Compact Disc Eraser – Top American invention prevents eWaste

It is common for CD-R and DVDR users to accumulate stacks of old discs that are no longer needed or outdated. A personal CD destroyer is now available that helps prevent data …

KoolSpan awarded in a review of two-factor authentication solutions

KoolSpan announced it has received five-stars and an ‘SC Recommended’ designation in a comparative group review of two-factor authentication technologies in the …

Don't miss

Cybersecurity news