Endpoint Protector 2008 addresses wireless USB security issues
The new Endpoint Protector 2008 efficiently protects PCs from data loss, data theft and other forms of data leakage.  The product allows the controlled use of USB devices, …
ID theft – six important safety tips to protect consumers
Monitor your accounts regularly online at bank and credit card websites. Americans who monitor their accounts online are most likely to uncover suspicious or unauthorized …
New release of Kaspersky Mobile Security
Kaspersky Lab announced the release of a new product for the integrated protection of smartphones running Symbian and Windows Mobile. Kaspersky Mobile Security 7.0 offers …
Download the new edition of global information security resource guide
(ISC)2 announced the release of its complimentary “2008 Resource Guide for Today’s Information Security Professional, Global Edition”. This 132-page guide …
P2P file sharing 2008’s greatest identity theft threat?
According to the Identity Theft Assistance Center (ITAC), throughout 2008 “criminals will continue to exploit new technologies to commit identity theft.” At the …
Blood bank’s laptops with sensitive information reported stolen
Two laptop computers are missing from Lifeblood blood bank’s possession and presumed to be stolen. The dual-password protected laptops were used on mobile blood …
High performance SSH/SCP – HPN-SSH
SCP and the underlying SSH2 protocol implementation in OpenSSH is network performance limited by statically defined internal flow control buffers. These buffers often end up …
Video: Rogue antispyware applications
Guys from F-Secure show how to find rogue antispyware applications by using Google search.
Microsoft releases five critical security bulletins
Another Patch Tuesday and Microsoft comes out with a variety of patches, and this series is quite serious. Users are recommended to update as soon as possible. The critical …
Downloaders may piggyback on unsecured WLAN to flout new UK laws
Sophos is warning computer users of the importance of properly securing their Wi-Fi networks following reports that people who illegally download music and films may have …
Research shows that identity fraud is in decline
The 2008 Identity Fraud Survey Report – released by Javelin Strategy & Research – confirms that identity fraud is declining in most parts of the United …
Report: Web browsers under siege from organised crime
IBM today released the findings of the 2007 X-Force Security report, detailing a disturbing rise in the sophistication of attacks by criminals on Web browsers worldwide. …
Featured news
Resources
Don't miss
- Radio signals could give attackers a foothold inside air-gapped devices
- Product showcase: RoboForm password manager for iOS
- LLMs are automating the human part of romance scams
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken