Foundstone’s Certified Ethical Hacker training course
McAfee’s Foundstone division will offer a “Certified Ethical Hacking” course, designed to empower IT professionals with the skills they need to detect …
Arrests related to email lottery scam
Sophos has reminded computer users about the danger of internet scams following the arrest of ten people in Spain alleged to have defrauded victims via an email lottery scam. …
WinMagic SecureDoc in combo with Seagate Secure disk drive technology
WinMagic announced that it is teaming with Seagate Technology to provide comprehensive, enterprise-class security for data-at-rest. The companies have agreed to unite their …
Former U.S. Attorney General to keynote at InfoSec World 2008
MISTI announced the addition of former U.S. Attorney General John D. Ashcroft as a keynote speaker at InfoSec World Conference and Expo 2008. Ashcroft will join an impressive …
GFI cuts prices of its security products by up to 45%
GFI Software has cut its prices on the majority of products by up to 45%. This is being done to reflect GFI’s longstanding belief in providing companies in the SMB …
Endpoint Protector 2008 addresses wireless USB security issues
The new Endpoint Protector 2008 efficiently protects PCs from data loss, data theft and other forms of data leakage.  The product allows the controlled use of USB devices, …
ID theft – six important safety tips to protect consumers
Monitor your accounts regularly online at bank and credit card websites. Americans who monitor their accounts online are most likely to uncover suspicious or unauthorized …
New release of Kaspersky Mobile Security
Kaspersky Lab announced the release of a new product for the integrated protection of smartphones running Symbian and Windows Mobile. Kaspersky Mobile Security 7.0 offers …
Download the new edition of global information security resource guide
(ISC)2 announced the release of its complimentary “2008 Resource Guide for Today’s Information Security Professional, Global Edition”. This 132-page guide …
P2P file sharing 2008’s greatest identity theft threat?
According to the Identity Theft Assistance Center (ITAC), throughout 2008 “criminals will continue to exploit new technologies to commit identity theft.” At the …
Blood bank’s laptops with sensitive information reported stolen
Two laptop computers are missing from Lifeblood blood bank’s possession and presumed to be stolen. The dual-password protected laptops were used on mobile blood …
High performance SSH/SCP – HPN-SSH
SCP and the underlying SSH2 protocol implementation in OpenSSH is network performance limited by statically defined internal flow control buffers. These buffers often end up …
Featured news
Resources
Don't miss
- The tech that turns supply chains from brittle to unbreakable
- Strix: Open-source AI agents for penetration testing
- Product showcase: SecAlerts – Relevant, actionable, up-to-the-minute vulnerability alerts
- The year ahead in cyber: What’s next for cybersecurity in 2026
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims