Scalable 10 Gbps intrusion prevention solution
As enterprise networks evolve, 10 Gbps network links have become relatively low in cost and increasingly more widespread. Core network upgrades driven by data center …
Compress and encrypt files from the Finder
Apimac released Compress Files “08, a compression tool for Mac OS X that enable Mac users to create a variety of compressed and encrypted files as well as encrypted disk …
Tax-time tips to prevent identity theft
According to the IRS, a record 77 million tax returns were filed electronically in 2007 and these figures are sure to increase in 2008. For an identity thief, tax time is …
Optimal IdM introduces Virtual Identity Server
Optimal IdM launched its Virtual Identity Server, a Microsoft-centric virtual directory that is developed entirely in .NET managed code and enhances the functionality of …
Microsoft Internet Explorer least vulnerable browser in Q4
Cenzic released its Application Security Trend Report for Q4 2007. This report includes a consolidation of findings for all of 2007, along with the Top 10 Web application …
Top 10 vulnerabilities in Web Applications in Q4 2007
Open SSL Off-By-One Overflow – An off-by-one overflow is triggered by the SL_Get_Shared_Ciphers() function and can execute arbitrary code on the target system. Java Web …
Cybercriminals develop tools to test malware before distribution
According to PandaLabs, cyber-crooks are looking for ways to test their creations before distributing them. An investigation conducted by the malware analysis and detection …
Windows Server 2008 certification for Kaspersky Anti-Virus 6.0
Kaspersky Anti-Virus 6.0 for Windows Server Enterprise Edition earned a Windows Server 2008 software certification. Windows Server 2008 certification guarantees that Kaspersky …
Windows Server 2008 certification for GFI EventsManager 8
GFI Software announced that its award-winning events monitoring and events management solution GFI EventsManager 8 has achieved “Certified for Windows Server 2008′ …
Consumer attitudes toward internet security across Europe and North America
F-Secure today announced the results of its first annual Online Wellbeing Survey. This third-party survey of Internet users aged 20-40 in the US, Canada, the UK, France and …
Hardware security modules for Windows Server 2008
Hardware security modules play a vital role in providing incremental security capabilities for business applications. In many industries the use of HSMs is either specifically …
Foundstone services to focus on virtualization security
McAfee, Inc. unveiled the industry’s first service designed to help organizations securely deploy virtualization technologies. As part of its strategy to provide the …
Featured news
Resources
Don't miss
- Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)
- How a noisy ransomware intrusion exposed a long-term espionage foothold
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory
- Cryptomixer crypto laundering service taken down by law enforcement