Arrests related to email lottery scam
Sophos has reminded computer users about the danger of internet scams following the arrest of ten people in Spain alleged to have defrauded victims via an email lottery scam. …
WinMagic SecureDoc in combo with Seagate Secure disk drive technology
WinMagic announced that it is teaming with Seagate Technology to provide comprehensive, enterprise-class security for data-at-rest. The companies have agreed to unite their …
Former U.S. Attorney General to keynote at InfoSec World 2008
MISTI announced the addition of former U.S. Attorney General John D. Ashcroft as a keynote speaker at InfoSec World Conference and Expo 2008. Ashcroft will join an impressive …
GFI cuts prices of its security products by up to 45%
GFI Software has cut its prices on the majority of products by up to 45%. This is being done to reflect GFI’s longstanding belief in providing companies in the SMB …
Endpoint Protector 2008 addresses wireless USB security issues
The new Endpoint Protector 2008 efficiently protects PCs from data loss, data theft and other forms of data leakage.  The product allows the controlled use of USB devices, …
ID theft – six important safety tips to protect consumers
Monitor your accounts regularly online at bank and credit card websites. Americans who monitor their accounts online are most likely to uncover suspicious or unauthorized …
New release of Kaspersky Mobile Security
Kaspersky Lab announced the release of a new product for the integrated protection of smartphones running Symbian and Windows Mobile. Kaspersky Mobile Security 7.0 offers …
Download the new edition of global information security resource guide
(ISC)2 announced the release of its complimentary “2008 Resource Guide for Today’s Information Security Professional, Global Edition”. This 132-page guide …
P2P file sharing 2008’s greatest identity theft threat?
According to the Identity Theft Assistance Center (ITAC), throughout 2008 “criminals will continue to exploit new technologies to commit identity theft.” At the …
Blood bank’s laptops with sensitive information reported stolen
Two laptop computers are missing from Lifeblood blood bank’s possession and presumed to be stolen. The dual-password protected laptops were used on mobile blood …
High performance SSH/SCP – HPN-SSH
SCP and the underlying SSH2 protocol implementation in OpenSSH is network performance limited by statically defined internal flow control buffers. These buffers often end up …
Video: Rogue antispyware applications
Guys from F-Secure show how to find rogue antispyware applications by using Google search.
Featured news
Resources
Don't miss
- August 2025 Patch Tuesday forecast: Try, try again
- Third-party partners or ticking time bombs?
- What GPT‑5 means for IT teams, devs, and the future of AI at work
- Microsoft urges admins to plug severe Exchange security hole (CVE-2025-53786)
- SonicWall: Attackers did not exploit zero-day vulnerability to compromise Gen 7 firewalls