EpicTide and AEP Networks Announce Market-Driven Alliance for Streamlined HIPAA Compliance and Secure Application Access
St. Petersburg, FL and Somerset, NJ – (January 17, 2006) – EpicTide, Inc., a leading provider of HIPAA compliance solutions, and AEP Networks, a leading provider …
New Software Recovers All Your Internet Passwords
January 2006. AccentSoft Team today announced the immediate availability of Accent Internet Password Recovery. Accent Internet Password Recovery is a versatile software …
CheckFree Investment Services Selects TriCipher for Multifactor Authentication
SAN MATEO, CA – January 17, 2006 — TriCipher, Inc. announced today that CheckFree Investment Services, a division of CheckFree Corporation (Nasdaq: CKFR), has selected …
The number of “classic’ viruses dropped dramatically in 2005 compared to worms and Trojans, reports Panda Software
MADRID, January 16, 2006 – According to data released by PandaLabs, less than one percent of the new threats detected in 2005 were viruses, whereas threats like Trojans …
Northern Trust Corporation Selects Pointsec to Protect Sensitive Customer Data
Chicago, IL – January 16, 2006 – Pointsec Mobile Technologies, the global leader and the provider of the de facto standard for enterprise security software for …
Imprisoned Russian Billionaire’s Fortune Offered By 419 Scammers
Experts at SophosLabs, Sophos’s global network of virus, spyware and spam analysis centres, have stopped thousands of messages related to an email scam that attempts to …
O’Reilly Releases “Essential PHP Security”
Farnham, UK–With PHP’s transition from a set of tools for personal home page development to the world’s most popular web programming language, PHP developers …
Kerio Technologies acquires WebSTAR from 4D
Kerio Technologies, a leading global provider of Internet security software and secure messaging solutions, has announced its acquisition of the WebSTAR product portfolio from …
Weekly Report on Viruses and Intruders -Mitglieder.HE and Spymaster.A Trojans and Mytob.ML worm
Today’s report looks at three security problems affecting several Microsoft products and which could allow an attacker to take control of vulnerable systems, two Trojans …
ISACA Survey Reveals Top Six Critical Elements of a Successful Information Security Program
Rolling Meadows, IL, USA (12 January 2005)—Senior management’s commitment to information security initiatives is the top critical element for ensuring effective …
Internet Security Systems Provides Integrated Components for HP Security Offering
LONDON — January 12, 2006 – Internet Security Systems, Inc. (ISS) (NASDAQ: ISSX) today announced the company is supporting HP’s security incident management …
US Spam Defendant Set To Be Sentenced To At Least Two Years In Jail, Sophos Reports
A man accused of sending millions of illegal spam emails from compromised computers belonging to well known companies and government organisations, is expected to plead guilty …
Featured news
Sponsored
Don't miss
- The rising influence of AI on the 2024 US election
- 10 colleges and universities shaping the future of cybersecurity education
- What is multi-factor authentication (MFA), and why is it important?
- MITRE breached by nation-state threat actor via Ivanti zero-days
- The first steps of establishing your cloud security strategy