Increasing threat of confidential information loss
A national security and privacy survey sponsored by CA showed that security threats from within an organization now are a bigger problem than attacks from external sources. At …
First ruggedized NAC appliance
Mirage Networks released a ruggedized appliance that is designed for environments where standard equipment cannot be deployed. The new appliance withstands temperature …
Advanced VFS301 fingerprint sensor
Validity Sensors launched the VFS301 fingerprint sensor. The durable and cost-effective VFS301 fingerprint sensor offers lower power, improved performance, a smaller form …
PCI managed security suite accelerates PCI compliance
Vendor Safe Technologies introduced its new PCI Managed Security Suite, a one-stop solution that enables restaurants and other merchants to comply with the credit card …
Critical security issues in the open source Spring Framework
Ounce Labs Advanced Research Team has documented two vulnerabilities that can affect Java web applications that utilize the Spring Framework. With more than five million …
New secure online backup service
Webroot announced the availability of Webroot Secure Backup, a new data backup solution for home PC users which protects digital photos, music and any other files from damage …
SD memory card for applications where recorded data must be unalterable
SanDisk Corporation introduced the SanDisk SDTM WORM Card, a Write Once Read Many (WORM) digital memory card intended for professional uses such as police investigations, …
Set of tools for data loss prevention
Orchestria FastStart DLP is a new combination of software and services designed to help organizations streamline deployment of a data loss prevention solution. Orchestria …
Phony UPS e-mail delivers a trojan
Panda Security has detected the appearance of a series of emails used to spread the Agent.JEN Trojan. The messages purport to come from the package delivery company UPS.  …
Adware components top list of Threats in June
The top three threats of the month are trojans, two of which are adware components and the third is part of a fake (or rogue) antivirus. In the first place is …
Cybercrime organizational structures and modus operandi
Finjan announced the latest findings by its Malicious Code Research Center (MCRC). In its latest trends report for Q2 2008, the MCRC identifies and analyzes the latest …
DataLossDB now maintained by Open Security Foundation
The Open Security Foundation (OSF) announced that the DataLossDB will be formally maintained as an ongoing project under the OSF umbrella organization as of July 15, 2008. …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform