Secure mobile information management technology platform
CellTrust Corporation announced the introduction of its new Secure Mobile Information Management platform that will give businesses and consumers the ability to use cell …
Video on targeted attacks
F-Secure’s Mikko Hypponen discusses the issue of Targeted Attacks.
Spyware Doctor gets a major overhaul
To make award-winning Spyware Doctor even more potent, PC Tools developers spent nearly two years rewriting their bullet-proof anti-malware technology to combat the next …
Securent joins with OASIS
Securent announced that it is a Sponsor Member of the Organization for the Advancement of Structured Information Standards (OASIS). OASIS is a not-for-profit, international …
Web application security tool extended for checking .NET applications
Fortify Software announced the extension of its Fortify Defender solution for applications written in the .NET language. Fortify Defender’s sophisticated technology …
nCipher payShield used by a leading bank in Croatia
nCipher announced that its payShield hardware security module (HSM) has been deployed at the core of a new telephone and internet banking system in Croatia. Privredna Banka …
2006 – a good year for Cyber-Ark
According to Cyber-Ark, 2006 marked a year of tremendous prosperity and growth in the emerging Privileged Password Management (PPM) market as regulatory compliance, along with …
First EAL4 evaluation to Swedish Common Criteria Scheme
atsec information security AB is performing an EAL4+ evaluation of Tutus Data AB F?¤rist VPN and Firewall for certification by the Swedish Certification Body for IT Security …
New solution in the secure file storage market
Dekart launched a new software product, Dekart File Move. This application is a real breakthrough in the secure files storage field. Private Disk File Move is designed to …
Malware of the week: Piggi.B worm, ReverseClick.A trojan and VideoCach adware
The Piggi.B worm, the ReverseClick.A Trojan, the VideoCach adware, and the potentially unwanted program (PUP) XPCSpy are the subject of this week’s PandaLabs report. The …
Vulnerability in the IPv6 protocol stack of OpenBSD
CoreLabs discovered that the OpenBSD kernel contains a memory corruption vulnerability in the code that handles IPv6 packets. Exploitation of this vulnerability can result in …
New Trojan variant steals confidential usernames and passwords
A Trojan variant named “Win32.LdPinch.kj’ can steal system usernames and passwords, get confidential data from applications and open a Backdoor in the compromised …
Featured news
Resources
Don't miss
- Attackers breached ConnectWise, compromised customer ScreenConnect instances
- Product showcase: Smarter pentest reporting and exposure management with PlexTrac
- CISO 3.0: Leading AI governance and security in the boardroom
- Review: Metasploit, 2nd Edition
- Security awareness training isn’t stopping breaches. Can AI help?